Docs » How to get started with Splunk On-Call » Configure Single Sign-On for Splunk On-Call » Configure Single Sign-On for Splunk On-Call

Configure Single Sign-On for Splunk On-Call 🔗

Requirements 🔗

This integration is compatible with the following versions of Splunk On-Call:

  • Full-Stack

To enable single sign-on (SSO) for your organization, you will need to provide an updated metadata file and your IDP. If you are interested in setting up SSO, please contact Splunk On-Call Support.

Configure Single Sign On between your Identity Provider (IDP) and Splunk On-Call. Our standard SSO setup uses SAML 2.0 protocol. As long as your IDP can use SAML 2.0 protocol, it can integrate with Splunk On-Call. The exact steps differ depending on which IDP you use, but the process typically involves exporting a .XML metadata file and sending it to our Support team. Once you have sent the .xml file, a Splunk On-Call support specialist will complete the setup on the back-end and respond with confirmation.

If your IDP does not have SAML capability, please contact Splunk On-Call Support to explore what alternative options may be available. For details on how to contact Splunk On-Call Support, see Contact Splunk On-Call Support.

Administrator Setup 🔗

Instructions to complete the SSO configuration with Splunk On-Call and your IDP are provided for:

Google Apps 🔗

To configure SSO for Splunk On-Call using Google Apps:

  1. Access the Admin portal for Google Apps and navigate to Apps then SAML Apps.

    Splunk On-Call SSO Google Apps Setup 1
  2. Select Set up my own custom app.

    Splunk On-Call SSO Google Apps Setup 2
  3. From Step 2 of the wizard, select Option 2 to download IDP metadata in XML format. Attach and send the downloaded .xml file to Splunk On-Call Support.

    Splunk On-Call SSO Google Apps Setup 3
  4. Save the Splunk On-Call logo file found HERE.

  5. Enter a name for the application (Splunk On-Call) and upload the logo file.

    Splunk On-Call SSO Google Apps Setup 5
  6. In the Service Provider Details step, enter the following values: - in the ACS URL field: https://sso.victorops.com:443/sp/ACS.saml2 - in the Entity ID field: victorops.com - in the Start URL field, enter the following with the correct Organization Slug at the end: https://portal.victorops.com/auth/sso/<<org-slug-here>>.

  7. Skip the attribute mapping step and select Finish.

This page was last updated on Aug 05, 2024.