Heads-up that a SAML login will overwrite your groups in SonarQube. Make sure you have another admin user available to recover.
To get group assignments via SAML to work with Okta I did something like the following:
- In SonarQube, go to Administration > Security > Groups (<SonarQube URL>/admin/groups)
- Create group
example-internal:sonarqube-admins
- Create group
example-internal:sonarqube-users
- In SonarQube, go to Administration > Security > Global Permissions (<SonarQube URL>/admin/permissions)
- Search for
example-internal:sonarqube-
- For group example-internal:sonarqube-admins, tick the Administer System, Administer Quality Profiles, Administer Quality Gates, and Create Projects check boxes
- In SonarQube, go to Administration > Security > Global Permissions (<SonarQube URL>/admin/permission_templates)
- By Default Template, click gear and select Edit Permissions
- Search for
example-internal:sonarqube-
- Tick same check boxes for
example-internal:sonarqube-users
as are ticked forsonar-users
- Tick same check boxes for
example-internal:sonarqube-admins
as are ticked forsonar-administrators
- Create
example-internal:sonarqube-users
in Okta and assign to appropriate users - Create
example-internal:sonarqube-admins
in Okta and assign to appropriate users (certainly include yourself while testing)
You can take this even further by creating group rules in Okta to assign users of AD groups to the example-internal:sonarqube- groups.