Docs » How to get started with Splunk On-Call » Configure Single Sign-On for Splunk On-Call

Configure Single Sign-On for Splunk On-Call 🔗

Requirements 🔗

This integration is compatible with the following versions of Splunk On-Call:

  • Full-Stack

To enable single sign-on (SSO) for your organization, you will need to provide an updated metadata file and your IDP. If you are interested in setting up SSO, please contact Splunk On-Call Support.

Configure Single Sign On (SSO) between your Identity Provider (IDP) and Splunk On-Call. Our standard SSO setup uses SAML 2.0 protocol. As long as your IDP can use SAML 2.0 protocol, it can integrate with Splunk On-Call. The exact steps differ depending on which IDP you use, but the process typically involves exporting a .XML metadata file and sending it to our Support team. Once you have sent the .xml file, a Splunk On-Call support specialist will complete the setup on the back-end and respond with confirmation.

If your IDP does not have SAML capability, please contact Splunk On-Call Support to explore what alternative options may be available. For details on how to contact Splunk On-Call Support, see Contact Splunk On-Call Support.

Administrator Setup 🔗

Instructions to complete the SSO configuration with Splunk On-Call and your IDP are provided for:

OneLogin 🔗

If you are configuring SSO for OneLogin, the Default relay state is:

Azure Active Directory (SAML-based Sign-on) 🔗

If you are configuring SSO for Azure Active Directory, use the following values:

  • Identifier: https://victorops.com

  • Reply URL: https://sso.victorops.com/sp/ACS.saml2

  • Sign on URL: https://portal.victorops.com/auth/sso/<<org-slug-here>>

  • Relay State: https://portal.victorops.com/auth/sso/<<org-slug-here>>

AWS IAM Identity Center - SAML 🔗

If you are configuring SSO for AWS IAM Identity Center:

  1. In the IAM Identity Center console find the Applications tab.

  2. Select Add Application and look for VictorOps.

  3. In the configuration settings ensure you set the fields as follows:

  • Important: Ensure the Session Duration is set to 1hour.

Application properties page. Application metadata page.

This page was last updated on Aug 05, 2024.