Configure Single Sign-On for Splunk On-Call 🔗
Requirements 🔗
This integration is compatible with the following versions of Splunk On-Call:
Full-Stack
To enable single sign-on (SSO) for your organization, you will need to provide an updated metadata file and your IDP. If you are interested in setting up SSO, please contact Splunk On-Call Support.
Configure Single Sign On between your Identity Provider (IDP) and Splunk On-Call. Our standard SSO setup uses SAML 2.0 protocol. As long as your IDP can use SAML 2.0 protocol, it can integrate with Splunk On-Call. The exact steps differ depending on which IDP you use, but the process typically involves exporting a .XML metadata file and sending it to our Support team. Once you have sent the .xml file, a Splunk On-Call support specialist will complete the setup on the back-end and respond with confirmation.
If your IDP does not have SAML capability, please contact Splunk On-Call Support to explore what alternative options may be available. For details on how to contact Splunk On-Call Support, see Contact Splunk On-Call Support.
Administrator Setup 🔗
Instructions to complete the SSO configuration with Splunk On-Call and your IDP are provided for:
Google Apps 🔗
To configure SSO for Splunk On-Call using Google Apps:
Access the Admin portal for Google Apps and navigate to Apps then SAML Apps.
Select Set up my own custom app.
From Step 2 of the wizard, select Option 2 to download IDP metadata in XML format. Attach and send the downloaded .xml file to Splunk On-Call Support.
Save the Splunk On-Call logo file found HERE.
Enter a name for the application (Splunk On-Call) and upload the logo file.
In the Service Provider Details step, enter the following values: - in the ACS URL field:
https://sso.victorops.com:443/sp/ACS.saml2
- in the Entity ID field:victorops.com
- in the Start URL field, enter the following with the correct Organization Slug at the end:https://portal.victorops.com/auth/sso/<<org-slug-here>>.
Skip the attribute mapping step and select Finish.