Synchronize groups using SAML authentication on Okta

authentication
saml

(Alain O'Dea) #1

Heads-up that a SAML login will overwrite your groups in SonarQube. Make sure you have another admin user available to recover.

To get group assignments via SAML to work with Okta I did something like the following:

  1. In SonarQube, go to Administration > Security > Groups (<SonarQube URL>/admin/groups)
  2. Create group example-internal:sonarqube-admins
  3. Create group example-internal:sonarqube-users
  4. In SonarQube, go to Administration > Security > Global Permissions (<SonarQube URL>/admin/permissions)
  5. Search for example-internal:sonarqube-
  6. For group example-internal:sonarqube-admins, tick the Administer System, Administer Quality Profiles, Administer Quality Gates, and Create Projects check boxes
  7. In SonarQube, go to Administration > Security > Global Permissions (<SonarQube URL>/admin/permission_templates)
  8. By Default Template, click gear and select Edit Permissions
  9. Search for example-internal:sonarqube-
  10. Tick same check boxes for example-internal:sonarqube-users as are ticked for sonar-users
  11. Tick same check boxes for example-internal:sonarqube-admins as are ticked for sonar-administrators
  12. Create example-internal:sonarqube-users in Okta and assign to appropriate users
  13. Create example-internal:sonarqube-admins in Okta and assign to appropriate users (certainly include yourself while testing)

You can take this even further by creating group rules in Okta to assign users of AD groups to the example-internal:sonarqube- groups.


No provider key found in URI
(Julien Lancelot) #2

@AlainODea I’ve move this post to a new topic as it was not related to the problem of No provider key found in URI.