Skip to main content

PagerDuty (SP-initiated) integration guide

This topic covers how to integrate the PagerDuty application in the SecureAuth® Identity Platform to securely allow the right user access to PagerDuty applications in your organization.

Prerequisites

  • PagerDuty account

  • Identity Platform release 24.04 or later

  • Have a defined user login authentication policy in the Identity Platform

  • Have an integrated data store in the Identity Platform

Identity Platform configuration

  1. On the left side of the Identity Platform, click Application Manager.

    Application Manager page in the SecureAuth Identity Platform for third party application integrations
  2. Click Add an Application.

    The application template library page displays.

  3. From the list of application templates, select PagerDuty.

    Select a third party application in the SecureAuth Identity Platform
  4. On the Applications Details page, set the following configurations.

    Application Name

    Default name of the application. You can optionally change the application name.

    The name displays on the Application Manager list and at the top of the Application Settings page.

    Application Description

    Enter a descriptive name about this application integration.

    Upload logo

    Optionally upload a different logo for the PagerDuty application.

    Authentication Policy

    Select the login authentication policy for the PagerDuty application.

    Data Stores

    Enter the data stores to to authenticate and allow user access for the PagerDuty application.

    Start typing to bring up a list of data store names. You can enter more than one data store.

    Groups

    Use one of the following options:

    • Slider in the On position (enabled): Allow users from every group in your selected data stores access to the PagerDuty application.

    • Slider in the Off position (disabled): Enter the specific groups who are allowed access to the PagerDuty application.

    Authentication policy and data store configuration settings for PagerDuty application integration in the SecureAuth Identity Platform
  5. Click Continue.

    The Connection Settings page displays.

    SAML connection settings for PagerDuty SP-initiated application integration in the SecureAuth Identity Platform
  6. In the Configure Connection section, the Connection Type is set to SP Initiated by Post.

    This is set by default. The user login process starts in the PagerDuty application, then redirects the user to the Identity Platform for authentication. Upon successful authentication, it asserts the user back to the PagerDuty application.

    It uses the SAML specification to send authentication requests (AuthNRequest) using HTTP Post binding with embedded signature.

    Default connection type for SP-initiated integrations in the Identity Platform
  7. In the User ID Mapping section, set the User ID Profile Field to the profile field in your data store that contains the PagerDuty user ID.

    User ID profile field configuration for user logins in third party integrations

    For example, if the log in page accepts a username like jsmith, you could set it to Authenticated User ID.

    Otherwise, if the log in page requires an email address, you could use another available profile field like Email 1, Email 2, Aux ID 1, and so on.

    Note

    If you select a user profile field other than Authenticated User ID, make sure you have the data store field attribute correctly mapped to an available profile property, like Email 1 (Work)=mail.

    Example of Active Directory user profile field mappings in the SecureAuth Identity Platform
  8. In the SAML Assertion section, set the following configurations.

    IdP Issuer

    A unique name that must match exactly on the Identity Platform side and the PagerDuty application side.

    This helps the PagerDuty application identify the Identity Platform as the SAML issuer.

    For example, https://company.pagerduty.com

    SAML Endpoint URL

    PagerDuty endpoint URL that initiates authentication and accepts the SAML assertion from the Identity Platform.

    For example, https://company.pagerduty.com/sso/saml/login

    Audience

    Optional. A unique string that identifies PagerDuty as the service provider (SP).

    Usually, this is the entity ID of the service provider.

    For example, https://company.pagerduty.com

    PagerDuty Login URL

    This is the PagerDuty login URL as a service provider (SP).

    Usually, this is the same address as the SAML Endpoint URL.

    For example, https://company.pagerduty.com/sso/saml/login

    Assertion will be valid for

    Indicate in hours and minutes, how long the SAML assertion is valid.

    This is referred to as SAML NotOnOrAfter in the SAML specifications.

    The default setting is one hour, but for more sensitive application resources, the recommended value is between one to five minutes.

    Offset Minutes

    Indicate in minutes to account for the time differences among devices.

    This is referred to as SAML NotBefore in the SAML specifications.

    Recommended value is five minutes.

    IdP Signing Certificate

    Click Select Certificate, then choose the IdP signing certificate to use.

    IdP Signing Certificate Serial Number

    When you select an IdP signing certificate, the serial number populates this field.

    Signing Algorithm

    The signing algorithm digitally signs the SAML assertion and response.

    Choose the signing algorithm – SHA1 or SHA2 (slightly stronger encryption hash and is not subject to the same vulnerabilities as SHA1).

    Sign SAML Assertion

    Indicate whether the Identity Platform signs the SAML assertion sent to the service provider (SP). The signed certificate ensures assertion integrity from the Identity Platform.

    Sign SAML Message

    Indicate whether the Identity Platform signs the SAML message, including the SAML assertion, sent to the service provider (SP). The signed certificate ensures message integrity from the Identity Platform.

    Encrypt SAML Assertion

    Indicate whether the Identity Platform sends an encrypted SAML assertion to the service Provider (SP).

    If the slider is ON, then select the data and key encryption methods:

    • Data Encryption Method – Select the algorithm of the data encryption method

    • Key Encryption Method – Select the type of key encryption method (symmetric or asymmetric)

    Example of SAML assertion configurations for third party application integrations in the SecureAuth Identity Platform
  9. Click Add Application.

    After saving the application, it displays the Information for Service Providers page.

    Example of configuration information for service providers for user authentication from SecureAuth Identity Platform
  10. To complete the integration and establish a working connection with SecureAuth, copy the following information as needed for the PagerDuty configuration.

    Login URL

    Logout URL

    IdP Issuer

    Click Copy to Clipboard to copy the Identity Platform realm information and paste it in the corresponding field in the PagerDuty service provider configuration, as required.

    IdP Signing Certificate

    Download the IdP Signing Certificate.

  11. Click Continue to Summary to review the PagerDuty application settings.

    pagerduty_app_edit.png
  12. Click Back to Application Manager to find the application added to the list.

PagerDuty configuration

  1. In PagerDuty, click Profile icon > Account Settings > Single Sign-on.

    The Enable Single Sign-on (SSO) page displays.

    Enable SSO configuration page in PagerDuty
  2. Make the following configurations.

    PagerDuty SAML endpoint URL

    PagerDuty endpoint login URL that initiates authentication and accepts the SAML assertion from the SecureAuth Identity Platform.

    For example, https://company.pagerduty.com/sso/saml/sign-in

    X.509 Certificate

    Open the downloaded IdP Signing Certificate from the SecureAuth Identity Platform in a text editor (see Identity Platform configuration, in Step 10).

    Copy and paste the contents into the X.509 Certificate box.

    Login URL

    Enter the URL of the SecureAuth Identity Platform and realm number of the PagerDuty integration. This authenticates the user SSO login through SecureAuth Identity Platform.

    This is known as the Login URL in the SecureAuth Identity Platform with the realm number in the URL. (see Identity Platform configuration, in Step 10).

    For example, https://company.secureauth.com/SecureAuth277

    Turn on Single Sign-on

    To use SSO, select this check box.

    Allow username/password login

    Select one of the following options in use with SSO:

    • Clear check box – Authenticate end user login through SecureAuth Identity Platform and assert user into PagerDuty application

    • Select check box – Bypass end user login through SecureAuth Identity Platform and login directly to PagerDuty application

Support

If you need help with this integration, please contact SecureAuth Support.