Single sign-on for private pages allows you to completely lock down your status page to employees only and have them authenticate with existing SSO credentials to both view the page and subscribe to notifications. Statuspage officially supports several identity providers and can integrate with any IdP that speaks SAML 2.0. Below, we list out our supported partners and how to set up a custom SAML application outside of our supported partners.

Note: SSO for Employee Viewers comes with all private status pages. The number of SSO Employees is dependent upon your private page plan.

Supported identity providers setup documentation:

  1. Setting up Okta for SSO Employee Viewers
  2. Setting up OneLogin for SSO Employee Viewers
  3. Setting up PingOne for SSO Employee Viewers
  4. Setting up Bitium for SSO Employee Viewers
  5. Setting up ADFS for SSO Employee Viewers

Set up SAML for page viewers

Note: We do not officially support signed Assertions from ADFS.

The following tutorial will take you through creating a custom SAML application to integrate with Statuspage SSO for Employee Viewers. We'll be creating a custom application within Okta for demonstration purposes. Keep in mind that these steps may differ slightly depending on your IdP setup.

  1. Click Your page in the left sidebar.

  2. Click Authentication from the second menu that opens in the left sidebar.
  3. Click Configure next to SAML.

  4. Scroll down to Using SAML. On top of this form, you'll see two values; ACS URL / Consumer URL and EntityID/Audience URI. These values will be needed within your IdP.

    • Alternately, you can click on service provider metadata XML file for this Organization to see the raw SAML metadata.

     

Continue setup in Bitium
  1. Continue setup within PingOne 
    1. Click on Applications in the top nav bar.

    2. Click Application Catalog in the secondary nav bar.

    3. Search for Statuspage in the search box, and then click on the arrow to start setting up your application.

    4. Click Setup to proceed to the SSO Instructions page.

    5. Download the certificate.

    6. Paste the certificate into the Certificate field in Statuspage (on the SAML SSO page). Be sure to include the header and footer lines when pasting your X.509 Certificate!

    7. Copy the Initiate Single Sign-On (SSO) URL value, and paste it into the SSO Target URL field in Statuspage.

    8. Click Save in Statuspage.

    9. Click on Continue to Next Step in your PingOne Admin to configure your connection to Statuspage. 

    10. Copy the EntityID / Audience URI value in Statuspage (from User management > Single sign-on) and paste it into the EntityID field in PingOne.

    11. Click Continue to Next Step.

    12. Select Email from the Identity Bridge Attribute or Literal Value field.

    13. Click Continue to Next Step.

    14. Customize the way your Statuspage app is displayed.

    15. Click Save & Publish, you'll be taken to a review page. 

    16. Review the configuration.
    17. Click Save.

    You've just enabled single sign-on for your Statuspage account. You can still login through Statuspage, and also through your list of available apps on PingOne.

Bitium's Documentation can be seen here.