SSO
Configure SAML Single Sign-On on Spike.sh
Last updated
Was this helpful?
Configure SAML Single Sign-On on Spike.sh
Last updated
Was this helpful?
This guide explains the settings you’d need to use to configure SAML with your Identity Provider. Once this is set up you should get an XML metadata file which you can provide to Spike.sh and start using SSO.
Guides for setting up SAML with other IdPs
Follow the configurations given below while configuring your SAML with your IdP. You can configure SAML SSO for Incident Management and Status Page products individually.
Assertion consumer service URL / Single Sign-On URL / Destination URL: https://app.spike.sh/sso/oauth/saml
Entity ID / Identifier / Audience URI / Audience Restriction: https://app.spike.sh
Response: Signed
Assertion Signature: Signed
Signature Algorithm: RSA-SHA256
Assertion Encryption: Unencrypted
Assertion consumer service URL / Single Sign-On URL / Destination URL: https://statuspage.spike.sh/sso/status-page/oauth/saml
Entity ID / Identifier / Audience URI / Audience Restriction: https://statuspage.spike.sh
Response: Signed
Assertion Signature: Signed
Signature Algorithm: RSA-SHA256
Assertion Encryption: Unencrypted
For example, in the case of Okta users, this is how the configuration looks
Add user mappings as shown below. Note that email
, firstName
and lastName
are mandatory.
Paste the IdP XML Metadata and save.
Use that slug at the time of login.
Once the SAML is configured, head over to Spike.sh and open
Once configured, you can find the organisation slug from