No results for

Powered byAlgolia

⭐️ SAML SSO is available on Enterprise plans.

Microsoft's Active Directory has been a long time the standard for managing an enterprise's users and their access permissions, and Azure Active Directory is its direct cloud counterpart. k6 Cloud integrates with Azure AD to provide organizations with a compliant way to handle on- and offboarding of team members to the service.

Prerequisites

To setup Azure AD SAML SSO based authentication to k6 Cloud you must have:

  1. An Enterprise plan or a plan with the SAML SSO add-on.
  2. An Azure AD Premium Subscription.

Configuration

  1. Navigate to https://portal.azure.com/.

  2. Log in to Azure and go to "Azure Active Directory" tab.

  3. Select the "Enterprise applications" service.

  4. Click on the "New application" button.

  5. Select "Non-gallery application".

    Azure AD New Application Type

  6. Give the application a name, e.g. k6 Cloud.

  7. Click "Add".

  8. When your application has successfully been added, click "Set up single sign on" (or the equivalent "Single sign-on" link in the left menu):

    Azure AD Setup Single Sign-On

  9. Click "SAML" to enable it:

    Azure AD Enable SAML

  10. Edit "Basic SAML Configuration":

    Azure AD Basic SAML Configuration

    Setting:

    PropertyValue
    Identifier (Entity ID)https://api.k6.io/sso/acs/
    Reply URL (Assertion Consumer Service URL)https://api.k6.io/sso/acs/
    Logout Urlhttps://app.k6.io/account/logout

    Resulting in:

    Azure AD Basic SAML Configuration

  11. Edit "User Attributes & Claims":

    Azure AD User Attributes

    Setting the following user attributes (and clearing the "Namespace" property for each attribute):

    AttributeValue
    Unique User Identifieruser.userprincipalname
    user.emailuser.userprincipalname
    user.usernameuser.userprincipalname
    user.first_nameuser.givenname
    user.last_nameuser.surname
    tokenAn unique token that you'll be provided with by the k6 Cloud support team.

    Resulting in:

    Azure AD User Attributes

  12. Copy the "App Federation Metadata Url" and send it to k6 Cloud support for completion of the setup.

    Azure AD SAML Signing Certificate

  13. Also, edit "SAML Signing Certificate" and set the "Signing option" to "Sign SAML response and assertion":

    Azure AD SAML Signing Certificate's signing option

  14. Before moving to the final step of testing the integration, make sure you've added the appropriate users and groups to the application in Azure AD:

    Azure AD Users and Groups menu

  15. Once you've gotten confirmation from k6 Cloud support that your account is ready we advise you to test the integration by clicking the "Test" button in Azure AD:

    Azure AD Test SSO

See also