Set up single sign-on (SSO) to let Identity Providers (IdPs) authenticate users.
This page is intended for Organization Admins and Organization Billing Admins. For conceptual information about managing users and roles and possible setups, visit User and role management.
SSO helps make user management efficient and secure. With SSO, an IdP – for example, Okta – authenticates users. Users can then log into Cloud Observability with their IdP credentials.
Cloud Observability supports SSO with OAuth2 for Google, and SSO with Security Assertion Markup Language (SAML) for Microsoft Entra ID (formerly Azure AD), Okta, and OneLogin.
With SSO, users can sign into Cloud Observability with their managed Google credentials. In other words, they can click Sign in with Google without a second sign-in.
Follow these steps to set up SSO for Cloud Observability:
1
746217134341-pp9knfd5e0b6b6n84jg3cjd5hsuguuot.apps.googleusercontent.com
You can revisit your settings by going to the API controls page and clicking Manage Third-Party App Access > Cloud Observability.
Integrate with Microsoft Entra ID to provide SSO for Cloud Observability users.
You need the following to integrate Cloud Observability with Microsoft Entra ID:
A Cloud Observability default user role.
Cloud Observability assigns the default role to all Microsoft Entra ID users.
To add Cloud Observability, click New application and then Create your own application. Enter Cloud Observability for the name and click Create.
Cloud Observability is now an application in Microsoft Entra ID.
Click to edit the Basic SAML Configuration panel and enter these values:
Identifier
1
2
https://app.lightstep.com/saml/metadata
# https://app.eu.lightstep.com/saml/metadata # EU data center
Reply URL
1
2
https://app.lightstep.com/api/v1/authentication/sso/saml_callback
# https://app.eu.lightstep.com/api/v1/authentication/sso/saml_callback # EU data center
Sign on URL
1
2
https://app.lightstep.com/api/v1/authentication/sso/saml_callback?RelayState=
# https://app.eu.lightstep.com/api/v1/authentication/sso/saml_callback?RelayState= # EU data center
Relay State
Leave this input blank. You’ll generate and enter the Relay State value in the next step.
Follow these steps to configure communication between Microsoft Entra ID and Cloud Observability:
RelayState
value to your clipboard.RelayState
value in the Relay State field.
Click Save.Follow the steps below to create a Microsoft Entra ID group and assign Cloud Observability users to that group. You then add that group to the Cloud Observability application.
You’re all set. Users can now sign into Cloud Observability from Cloud Observability’s SAML SSO sign-in tab.
Set up SSO with Okta to let Okta authenticate, authorize, and manage Cloud Observability users.
The Okta integration uses System for Cross-domain Identity Management (SCIM) to sync user information between Cloud Observability and Okta.
Once you set up the integration, Okta Admins can provision, de-provision, and update Cloud Observability users in Okta. New Cloud Observability users are assigned the default role. And they can sign into Cloud Observability from Okta or Cloud Observability.
To complete the steps below, you need an Admin Okta account in an organization with SCIM provisioning privileges.
In Cloud Observability, you must be an Organization Admin. You also need the following:
In August 2023, Lightstep became Cloud Observability. The Okta integration uses the Lightstep name, but it works with Cloud Observability.
Follow these steps to add the Cloud Observability integration to Okta:
Follow these steps to connect Okta to your Cloud Observability organization and let Okta manage users:
Set the user identifier to email:
Connect Okta to your Cloud Observability organization:
Base URL - Enter https://api.lightstep.com/public/v0.2/YOUR-ORG
and replace YOUR-ORG
with your Cloud Observability organization name.
EU data center customers, use https://api.eu.lightstep.com/public/v0.2/YOUR-ORG
API Token - Enter your Cloud Observability API key.
Let Okta create, update, and deactivate Cloud Observability users:
Rotate your API keys regularly to keep applications secure. Follow these steps to rotate the Cloud Observability API key in Okta:
With SSO, users can sign in from Okta or Cloud Observability. Follow these steps to enable SSO:
You’re all set. You can now assign users to your Cloud Observability integration in Okta. Users can then sign into Cloud Observability from the Okta dashboard or Cloud Observability’s SAML SSO sign-in tab.
Integrate with OneLogin to let OneLogin handle user authentication.
Cloud Observability supports these SAML features:
You need the following to integrate Cloud Observability with OneLogin:
A Cloud Observability default user role.
Cloud Observability assigns the default role to all Microsoft Entra ID users.
In August 2023, Lightstep became Cloud Observability. The OneLogin integration uses the Lightstep name, but it works with Cloud Observability.
RelayState
value into the Default Relay State field, and save.Assign OneLogin roles or users to Cloud Observability to let users sign into Cloud Observability from OneLogin or Cloud Observability.
Assign OneLogin roles to Cloud Observability:
In OneLogin, go to the Access tab and select the roles to have Cloud Observability access.
Assign OneLogin users to Cloud Observability:
You’re all set. The assigned users can now sign into Cloud Observability from OneLogin or from Cloud Observability’s SAML SSO sign-in tab.
Updated Feb 26, 2024