Users & Security

Configuring SAML SSO

If you're a Cronitor team administrator, you can enable single sign-on (SSO) using any SAML2 identity provider, such as Okta, Azure AD, or Google Workspace, to simplify user access and enhance security.

Integrate w/ Identity Provider (IdP)

Step 1: Get Cronitor's SAML details

When configuring your identity provider, you'll need these Cronitor URLs:

ParameterValue
SAML Metadata URLhttps://cronitor.io/auth/saml/metadata
Assertion Consumer Service URLhttps://cronitor.io/auth/saml/acs/ENCODED-SAML-ID

Step 2: Configure your Identity Provider (IdP)

Use these settings when setting up the SAML integration:

SettingValue
NameId Formaturn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
SAML ProtocolSAML2 with HTTP-Redirect (SP to IdP) and HTTP-POST (IdP to SP)
Attributes
AttributePurposeRequired?
firstNameUser's first nameRequired for JIT user creation
lastNameUser's last nameRequired for JIT user creation
roleUser's access level: readonly, user, or adminOptional

Step 3: Gather information from your IdP

Before moving to the next section, collect these three items from your identity provider:

Required ItemDescriptionExamples
SSO Login URLThe SAML login endpointhttps://yourcompany.okta.com/app/...
Entity IDIdP identifierOften the metadata URL or Azure AD Identifier
x509 CertificatePublic certificate for signature validationPEM-formatted certificate

Enable SSO in Cronitor

Step 1: Access SSO configuration

Log into Cronitor as an administrator, navigate to Team Settings, and click the "Configure SSO" button to begin setup.

Note: If the button is disabled, ensure your team is subscribed to the Business plan.

SSO configuration button

Step 2: Enter your identity provider details

Add the information you gathered from your IdP in the previous section:

FieldInstructions
SSO Login URLEnter the login URL provided by your identity provider (IdP).
Entity IDEnter your identity provider's unique Entity ID or metadata URL.
X.509 CertificatePaste the full certificate text provided by your IdP (open .cer or .pem files in a text editor).
SSO configuration form

Step 3: Configure User Provisioning (Optional)

You can optionally enable Just-in-Time (JIT) provisioning, which automatically creates a Cronitor user account when someone signs in through your identity provider for the first time.

SettingOptionsDefaultDescription
JIT ProvisioningEnabled / DisabledEnabledAutomatically create Cronitor user accounts on first login
Default Rolereadonly, user, adminuserDefault user role if the identity provider doesn't specify one
JIT provisioning settings

Step 4: Test Your SAML Integration

To verify your SSO configuration:

  1. Save your SAML configuration settings.
  2. Sign in through your identity provider's portal.
  3. Confirm successful authentication and access to your Cronitor account.

Step 5: Disable password authentication (optional)

  1. Keep yourself logged in during this process
  2. Test SAML login in another browser or incognito window
  3. Only disable password authentication after successful SAML testing
  4. Re-enable password auth immediately if SAML tests fail

Security Checklist

Action
[ ]Test SAML login before disabling passwords
[ ]Verify JIT provisioning creates accounts correctly
[ ]Confirm role mapping works as expected
[ ]Keep an admin account accessible during testing
[ ]Document IdP configuration for future reference
Previous
Teams & Roles