No results for

Powered byAlgolia


suggest edits

⭐️ SAML SSO is available on Enterprise plans.


Federated authentication is a must to virtually all organizations beyond a certain size. Microsoft's Active Directory product has been a long time gold standard for managing an enterprise's users and their access permissions, and Azure Active Directory is its direct cloud counterpart. k6 Cloud integrates with Azure AD to provide organizations with a compliant way to handle on- and offboarding of team members to the service.

What is SAML?

Security Assertion Markup Language (SAML) is an open standard for exchanging authentication and authorization data between parties, in particular, between an Identity Provider (e.g. Azure AD) and a Service Provider (e.g. k6 Cloud). SAML is an XML-based markup language for security assertions (statements that service providers use to make access-control decisions).

Read more over at Wikipedia.


To setup Azure AD SAML SSO based authentication to k6 Cloud you must have:

  1. A Team plan or above and the SAML SSO add-on(\$), alternatively be on an Enterprise plan.
  2. An Azure AD Premium Subscription.


  1. Navigate to

  2. Log in to Azure and go to "Azure Active Directory" tab.

  3. Select the "Enterprise applications" service.

  4. Click on the "New application" button.

  5. Select "Non-gallery application".

    Azure AD New Application Type

  6. Give the application a name, e.g. k6 Cloud.

  7. Click "Add".

  8. When your application has successfully been added, click "Set up single sign on" (or the equivalent "Single sign-on" link in the left menu):

    Azure AD Setup Single Sign-On

  9. Click "SAML" to enable it:

    Azure AD Enable SAML

  10. Edit "Basic SAML Configuration":

    Azure AD Basic SAML Configuration


    Identifier (Entity ID)
    Reply URL (Assertion Consumer Service URL)
    Logout Url

    Resulting in:

    Azure AD Basic SAML Configuration

  11. Edit "User Attributes & Claims":

    Azure AD User Attributes

    Setting the following user attributes (and clearing the "Namespace" property for each attribute):

    Unique User Identifieruser.userprincipalname
    tokenAn unique token that you'll be provided with by the k6 Cloud support team.

    Resulting in:

    Azure AD User Attributes

  12. Copy the "App Federation Metadata Url" and send it to k6 Cloud support for completion of the setup.

    Azure AD SAML Signing Certificate

  13. Also, edit "SAML Signing Certificate" and set the "Signing option" to "Sign SAML response and assertion":

    Azure AD SAML Signing Certificate's signing option

  14. Before moving to the final step of testing the integration, make sure you've added the appropriate users and groups to the application in Azure AD:

    Azure AD Users and Groups menu

  15. Once you've gotten confirmation from k6 Cloud support that your account is ready we advise you to test the integration by clicking the "Test" button in Azure AD:

    Azure AD Test SSO

Setting up access to projects

With a completed integration between k6 Cloud and Azure AD your team members can Single Sign On to k6 Cloud via the Azure Portal. The next step is to setup project access permissions for team members in k6 Cloud, this doesn't happen automatically as part of account provisioning.

The steps to do this is as follows:

  1. Team members need to SSO into k6 Cloud first for account provisioning to happen.
  2. See our docs on adding team members for more information on how to setup access permissions to projects for team members.

Note: You must not invite team members through the k6 Cloud web app. Rather, as stated in 1) above, team members must SSO into k6 Cloud for account provisioning to happen.