Skip to main content

Auth0

  1. First, go to your dashboard, select "Application", and click on "Create Application"

  2. Choose "Regular Web Applications" as type and a name.

auth0 create app

  1. Go to your application addons. Click on "SAML2 Web App"

  2. First, fill the Application Callback URL with the ACS URL provided in GitGuardian dashboard.

auth0 setup acs

  1. Then, in the settings, we can configure mappings, name identifier and message signatures. Don't forget to save your changes. \ Here are the settings we use:
{  "mappings": {    "first_name": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname",    "last_name": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname"  },  "signatureAlgorithm": "rsa-sha256",  "digestAlgorithm": "sha256",  "signResponse": true,  "nameIdentifierFormat": "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress"}
  1. Finally, we need to configure the Identity Provider in GitGuardian dashboard. First, click on "Usage", then use these values:
    • Entity Id field is filled with the Issuer value
    • Single Sign-On URL field is filled with the Identity Provider Login URL value
    • X509 Cert field is filled with the plain text value of the certificate

auth0 idp settings