Single sign-on allows Statuspage team members to access the account using their existing single sign-on credentials within an identity provider (IdP) such as Okta, OneLogin, or Ping Identity. Statuspage officially supports several identity providers and can integrate with any IdP that speaks SAML 2.0. Below, we list out our supported partners and how to set up a custom SAML application outside of our supported partners.

Note: Single sign-on for private pages comes with all private pages and Startup and higher plans for public pages. The number of SSO viewers depends on your plan. 

Supported identity providers setup documentation:

  1. Setting up Okta for SSO Team Members

  2. Setting up OneLogin for SSO Team Members

  3. Setting up PingOne for SSO Team Members

  4. Setting up Bitium for SSO Team Members

  5. Setting up ADFS for SSO Team Members

Set up Okta SAML for private pages

The following steps will take you through creating a custom SAML application to integrate with Statuspage team members. We'll be creating a custom application within Okta for demonstration purposes. Keep in mind that these steps may differ slightly depending on your IdP setup.

You must also invite the user to be a team member inside of Statuspage before they can sign in. We do not support "Just-in-time" provisioning of team member accounts.

  1. Click Your page in the left sidebar.

  2. Click Authentication from the second menu that opens in the left sidebar.
  3. Click Configure next to SAML.

  4. Add the Statuspage application in your identity provider - On top of this section, you'll see two values; ACS URL / Consumer URL and EntityID/Audience URI. These values will be needed within your IdP.

    • Alternately you can click service provider metadata XML file for this Organization to see the raw SAML metadata.

 
Continue setup within Okta
  1. Navigate to Applications -> Add Application.

  2. Search for 'Statuspage' and you should see 'Statuspage SAML' appear. Click to add the application.

  3. Give the application a label, such as 'Statuspage Viewers'.

  4. Copy and paste the ACS Url and Entity ID from Statuspage into the designated fields. 'Application Visibility' is up to you and not required for the integration.

    • While the app has been created, setup is not complete just yet. Okta optionally allows you to add users to the app in this step, although adding users can also be done after the fact.

  5. Click Done.
  6. Sign in to the new app.

  7. Click View Setup Instructions. This opens a new tab will of the information needed to paste back into the Statuspage SSO setup page.

Completing setup

  1. Copy and paste the SSO Target URL and Certificate into your Statuspage SAML single sign-on page. Be sure to include the BEGIN header and END footer.

  2. You can either assign individual people or groups of users to the application in Okta. These users will be able to authenticate to view the status page and subscribe to updates. They will not have access to manage the status page itself.

  3. Click Save in Statuspage.

     

You have enabled single sign-on for your Statuspage account. You can still login through Statuspage, and also through your list of available apps within your IdP.