Single Sign-On (SSO) via SAML
HackerOne supports Single Sign-On (SSO) through Security Assertion Markup Language 2.0 (SAML 2.0) for these providers:
Contact HackerOne if you have another SAML provider.
Note: Your program must be launched and not in sandbox mode to set up SAML.
To configure Single Sign-On via SAML:
- Go to: Program Settings > General > Authentication.
- Click Setup SAML in the Single Sign-on with SAML section.
- Click Enter Configuration on the SAML Configuration page.
- Enter information for these fields:
|Domain||The domain for users that will be required to use SAML authentication. The domain must be verified before entering. If you don't have a verified domain, see Domain Verification to set up a verified domain. Note: Please use your own domain, not the HackerOne domain.|
|Single Sign On URL||The URL from your SAML provider to initiate a single sign-on attempt, sometimes called the login URL.|
|X509 Certificate||The certificate from your SAML provider to verify the single sign-on response.|
- Click Save.
- Click Start Test in the Test it section of the SAML Configuration page.
- Click Run test in the SAML Settings Test modal that pops up.
- Click Start test now.
- Enter your login credentials to the test window. After your login attempt, the test will either succeed or fail and provide warning messages about your test login. If your test fails, run another test by going back to step 6 above.
- Click Verify Settings.
- Click Verify in the Verify SAML Settings modal. Once you verify your settings, you won't be able to change your settings or run tests on the domain anymore.
- Click Enable SAML once you're ready to migrate all user accounts to SAML authentication.
- Click Enable in the Enable SAML modal that pops up.
Once you've successfully enabled SAML, all users that are part of the domain will be required to authenticate using SAML. The passwords associated with those accounts will be removed. Users will receive instructions on their first log in informing them of the change.
Here are some screenshots that provide additional details on Service Provider and Attribute mapping: