Setting Up SAML/SSO
Last updated
Last updated
Visit the SAML Service Provider (SP) Metadata link: https://app.pixiebrix.com/api/saml/metadata/
Download to a file. In Step 2, you will upload the metadata file to your Identity Provider (IDP)
The documentation uses JumpCloud as an IDP in the example below. However, the configuration should be similar for any vendor. Please feel free to contact [email protected] if you have any questions/concerns.
Login to JumpCloud as an Administrator: https://console.jumpcloud.com/login/admin
Click “SSO” on the left side panel. Then click “Add New Application” > “Custom SAML App”
“General Info” tab
Display Name: PixieBrix
“SSO” tab
In another tab, navigate to https://app.pixiebrix.com/api/saml/metadata/ and save the metadata to a file
Upload Metadata: Then upload the metadata to JumpCloud. Uploading the metadata should populate the following fields:
- Service Provider (SP) Entity ID - ACS URL
IDP Entity ID:
Note the IDP Entity ID
If you do not already have an IDP Entity ID, contact [email protected]
User Attributes: PixieBrix requires certain attributes to provision a user from your IDP. You must map attributes from your IDP to the Service Provider attributes PixieBrix requires.
SAML defines Attribute Definitions for configuring Service Provider attributes. For example, urn:oid:0.9.2342.19200300.100.1.3
corresponds to the user’s email.
PixieBrix requires the following attributes:
Service Provider Attribute Name | Identity Provider Attribute |
---|---|
| Unique User Identifier (e.g., Username) |
| |
| First Name / Given Name |
| Last Name / Surname / Family Name |
Example: JumpCloud Configuration
Service Provider Attribute Name | JumpCloud Attribute Name |
---|---|
| username |
| |
| first Name |
| last Name |
For example, once completed in JumpCloud, the “User Attributes” section should contain the following attribute name mapping:
Refer to the Microsoft Entra Documentation for accessing the Attributes & Claims.
Service Provider Attribute Name | Entra Attribute Name |
---|---|
| user.userprincipalname |
| user.mail |
| user.givenname |
| user.surname |
Refer to Okta Help Article: Attribute Claims Mapping with Custom SAML Application
Grant the users that should have access to log in with SAML.
For example: the screenshot below shows granting the PixieBrix Engineering group access to the SAML App in JumpCloud
PixieBrix needs certain data from the IDP to complete the integration. Please securely send [email protected] the following information:
IDP Entity ID
IDP URL (aka SSO URL)
IDP Public Certificate: You can download the public certificate from the IDP.
For example, in JumpCloud, you can download the certificate from the IDP Certificate Valid dropdown, and clicking "Download Certificate”:
After providing the IDP information to the PixieBrix support team in Step 3, the PixieBrix team will provide a URL for the authentication flow.
The sign-in URL the support team provides will have the form: https://app.pixiebrix.com/login/saml/?idp=<label>,<orgId>
orgId
: your tenant id in PixieBrix
label
: a label to distinguish multiple IDPs for a single tenant
You can configure your PixieBrix Browser Extension Policy (Google Workspace or GPO) to automatically authenticate with your configured IDP.
Contact [email protected] to receive the authentication flow URL
Set the ssoUrl
property for the managed browser extension settings. Read more information on IT-managed browser extension configuration in Browser Extension Configuration Policy
Property | Value |
| Authentication flow URL. Will have the form: |
This IDP error indicates that the user has not been assigned to the SAML application. Refer to Step 2c: Assign Users in the Identity Provider to the SAML Application
The server error upon IDP login indicates that the user attributes have not been mapped in the Identity Provider property. Refer to Step 2b: Configure the Service Provider Attribute Name Mapping The PixieBrix platform team is working to improve the error message. In the meantime, contact [email protected] to receive the error details