You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/content/en/customize_dojo/user_management/configure_sso.md
+43-43Lines changed: 43 additions & 43 deletions
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ Users can connect to DefectDojo with a Username and Password, but if you prefer,
17
17
All of these methods can only be configured by a Superuser in DefectDojo. DefectDojo Pro users can quickly set up SSO through their system settings, while Open Source users will need to configure these settings on the back-end via the local_settings.py file. This article covers both methods of configuration.
18
18
19
19
## Disable username / password use
20
-
You may wish to disable traditional username/password login on your instance.
20
+
You may wish to disable traditional username/password login on your instance.
21
21
22
22
<spanstyle="background-color:rgba(242, 86, 29, 0.3)">DefectDojo Pro</span> users can uncheck the "Allow Login via Username and Password" box on the Login Settings form: **Enterprise Settings > Login Settings**.
Open-Source users will need to map these variables in the local_settings.py file. (see [Configuration](../../os_getting_started/configuration)).
71
+
Open-Source users will need to map these variables in the local_settings.py file. (see [Configuration](../../open_source/installation/configuration/)).
72
72
73
73
1. Fill out the variables as follows:
74
74
{{< highlight python >}}
@@ -141,7 +141,7 @@ When a user is removed from a given group in Azure AD, they will also be removed
141
141
142
142
### Open-Source
143
143
144
-
Open-Source users will need to map these variables in the local_settings.py file. (see [Configuration](../../os_getting_started/configuration)).
144
+
Open-Source users will need to map these variables in the local_settings.py file. (see [Configuration](../../open_source/installation/configuration)).
145
145
146
146
1. Add the following information to the settings file:
147
147
@@ -155,7 +155,7 @@ Open-Source users will need to map these variables in the local_settings.py file
155
155
2. Restart DefectDojo, and you should now see a **Login with Azure AD** button on the login page.
156
156
157
157
#### Open-Source Azure Group Mapping
158
-
To import groups from Azure AD users, the following environment variable needs to be set:
158
+
To import groups from Azure AD users, the following environment variable needs to be set:
@@ -170,7 +170,7 @@ If unsure of what type that is, select `All Groups`. Do not activate `Emit group
170
170
Application API permissions need to be updated with the `Group.Read.All` permission so that groups can be read on behalf of the user that has successfully signed in.
171
171
172
172
To limit the amount of groups imported from Azure AD, a regular expression can be used as the following:
173
-
173
+
174
174
{{< highlight python >}}
175
175
DD_SOCIAL_AUTH_AZUREAD_TENANT_OAUTH2_GROUPS_FILTER='^team-.*' # or 'teamA|teamB|groupC'
1. Edit the local_settings.py file (see [Configuration](../../os_getting_started/configuration)) with the following:
492
+
1. Edit the local_settings.py file (see [Configuration](../../open_source/installation/configuration)) with the following:
493
493
494
494
{{< highlight python >}}
495
495
DD_SOCIAL_AUTH_OKTA_OAUTH2_ENABLED=True,
@@ -515,27 +515,27 @@ GET parameter starts with `http://` instead of
515
515
516
516

517
517
518
-
2. Complete the SAML form. Start by setting an **Entity ID** \- this is either a label or a URL which your SAML Identity Provider can point to, and use to identify DefectDojo. This is a required field.
518
+
2. Complete the SAML form. Start by setting an **Entity ID** \- this is either a label or a URL which your SAML Identity Provider can point to, and use to identify DefectDojo. This is a required field.
519
519
520
-
3. If you wish, set **Login Button Text** in DefectDojo. This text will appear on the button or link users click to initiate the login process.
520
+
3. If you wish, set **Login Button Text** in DefectDojo. This text will appear on the button or link users click to initiate the login process.
521
521
522
-
4. You can also set a **Logout URL** to redirect your users to once they have logged out of DefectDojo.
522
+
4. You can also set a **Logout URL** to redirect your users to once they have logged out of DefectDojo.
523
523
524
-
5. The **Name ID Format** has four options: Persistent, Transient, Entity and Encrypted.
525
-
526
-
- If you would prefer that users have a different SAML ID each time they access
527
-
DefectDojo, choose **Transient**.
528
-
- If you want your users to be consistently identified by SAML, use **Persistent.**
529
-
- If you’re ok with all of your users sharing a SAML NameID, you can select **Entity.**
524
+
5. The **Name ID Format** has four options: Persistent, Transient, Entity and Encrypted.
525
+
526
+
- If you would prefer that users have a different SAML ID each time they access
527
+
DefectDojo, choose **Transient**.
528
+
- If you want your users to be consistently identified by SAML, use **Persistent.**
529
+
- If you’re ok with all of your users sharing a SAML NameID, you can select **Entity.**
530
530
- If you would like to encrypt each user’s NameID, you can use **Encrypted** as your NameID format.
531
531
532
-
6. **Required Attributes** are the attributes that DefectDojo requires from the SAML response.
532
+
6. **Required Attributes** are the attributes that DefectDojo requires from the SAML response.
533
+
534
+
7. **Attribute Mapping** contains a formula for how you want these attributes to be matched to a user. For example, if your SAML response returns an email, you can associate it with a DefectDojo user with the formula **email=email**.
533
535
534
-
7. **Attribute Mapping** contains a formula for how you want these attributes to be matched to a user. For example, if your SAML response returns an email, you can associate it with a DefectDojo user with the formula **email=email**.
535
-
536
536
The left side of the ‘=’ sign represents the attribute you want to map from the SAML response. The right side is a user’s field in DefectDojo, which you want this attribute to map to.
537
537
538
-
8. **Remote SAML Metadata** is the URL where your SAML Identity Provider is located.
538
+
8. **Remote SAML Metadata** is the URL where your SAML Identity Provider is located.
539
539
540
540
9. Finally, check the **Enable SAML** checkbox at the bottom of this form to confirm that you want to use SAML to log in. Once this is enabled, you will see the **Login With SAML** button on the DefectDojo Login Page.
541
541
@@ -558,7 +558,7 @@ The left side of the ‘=’ sign represents the attribute you want to map from
558
558
### Open-Source SAML
559
559
560
560
1. Navigate to your SAML IdP and find your metadata.
561
-
2. Edit the local_settings.py file (see [Configuration](../../os_getting_started/configuration)) with the following information:
561
+
2. Edit the local_settings.py file (see [Configuration](../../open_source/installation/configuration)) with the following information:
0 commit comments