Configuring SAML with Microsoft Entra ID in SonarQube Server
On this page
This page explains how to set up SAML in SonarQube Server when using Microsoft Entra ID as the identity provider. This is the second step of SAML authentication setup with Microsoft Entra ID. For an overview of the complete setup, see Setting up SAML with Microsoft Entra ID.
Proceed as follows:
- Open MS Entra ID to prepare the copy-paste of single-sign-on settings in SonarQube Server.
- Configure SAML in SonarQube Server.
Open MS Entra ID
To prepare the copy-paste of single-sign-on settings in SonarQube Server:
- In Microsoft Entra ID, go to Identity > Applications > Enterprise applications > All applications and select the application you created for SonarQube Server.
- On the application's page, select Single sign-on. You will need to retrieve values related to sections 1, 2, and 4. In section 2, select Edit first to open the Attributes & Claims page.
Configure SonarQube Server
1. Go to Administration > Configuration > General Settings > Authentication> SAML.
2. Select Create Configuration.
3. Fill in the fields as explained in the table below.
Field in SonarQube Server | Description |
---|---|
Application ID | Value in MS Entra ID:In the Basic SAML Configuration section (1), value of the Identifier(Entity ID) field. |
Provider ID | Value in MS Entra ID:In the Set up <applicationForSonarQubeServer> section (4), value of the Microsoft Entra ID Identifier field. |
Provider Name | Name of the Identity Provider displayed in SonarQube Server login page when SAML authentication is active. |
SAML Login URL | Value in MS Entra ID:In the Set up <applicationForSonarQubeServer> section (4), value of the Login URL field. |
Identity provider certificate | Certificate downloaded in Step 2 of Setup in Entra ID. |
SAML user login attribute | Value in MS Entra ID:In the Attributes & Claims section (2), select Edit and retrieve the Claim name (URL type value) of the attribute to be used for Login. For an example, see the SonarQube Server screenshot below. |
SAML user name attribute | Value in MS Entra ID:In the Attributes & Claims section (2), select Edit and retrievethe Claim name (URL type value) of the attribute to be used for Name. For an example, see the SonarQube Server screenshot below. |
SAML user email attribute | Optional. Value in MS Entra ID:In the Attributes & Claims section (2), select Edit and retrieve the Claim name (URL type value) of the attribute to be used for email. |
SAML group attribute | Optional (if you want to use the group synchronization). Value in MS Entra ID:In the Attributes & Claims section (2), select Edit and retrieve the Claim name (URL type value) of the groups attribute. |
Below is a SonarQube Server screenshot with SAML user login and name value examples.
4. Save the configuration.
5. Before enabling SAML authentication on SonarQube Server, you can verify that the configuration is correct by selecting Test Configuration. This will initiate a SAML login and return useful information about the SAML response obtained from the identity provider.
6. Select Enable configuration.
7. Check that the SonarQube Server login form now contains a SAML login button.
Related pages
Was this page helpful?