Configure SAML
Continuous Delivery for Puppet Enterprise (PE) supports the use of Security Assertion Markup Language (SAML) authentication from a SAML identity provider (IDP). Once you configure your SAML IDP to integrate with Continuous Delivery for PE, you can use your chosen single sign-on tool to authenticate users to Continuous Delivery for PE.
Before you begin
Your enterprise SAML team must configure your organization's SAML IDP to communicate
with Continuous Delivery for PE. Provide the SAML team with the Continuous Delivery for PE SAML redirect URL for your installation: <YOUR CD4PE WEB UI ENDPOINT>/cd4pe/saml-auth
. The SAML
team uses this to register Continuous Delivery for PE as an application with
permissions to interact with the IDP.Get this information from your enterprise SAML team:
- The IDP-initiated SSO URL that Continuous Delivery for PE needs to direct user authentication requests.
- The IDP public signing certificate for Continuous Delivery for PE.
- The SAML attribute names that come back in the SAML assertion for these fields: first name, last name, email address, and username. (Attribute mapping is explained in step 4, below.)
If your IDP cannot use the saml-auth
endpoint for
configuration, the following may be helpful:
- Entity ID: CD4PE
- Signing certificate: This is generated by the IDP or the team managing the IDP. The public cert is then saved in Continuous Delivery for PE via a settings page in the Continuous Delivery for PE root console.
-
ACS (Assertion Consumer Service) URL:
<CD4PE WEB UI ENDPOINT>/cd4pe/saml-auth
- Logout URL: We do not support a logout URL for SAML integrations, this can only be performed through the Continuous Delivery for PE UI. If this is an optional config option in PingID, it can be left blank.