Setup of security features
To improve security, you can set up the encryption of SAML assertions sent by Microsoft Entra ID and the signing of SAML requests sent by SonarQube Server.
Once you have registered SonarQube Server in Microsoft Entra ID (see Setup in Microsoft Entra ID), you can set up the following security features:
The encryption of SAML assertions emitted by Microsoft Entra ID for SonarQube Server. For more information, see SAML token encryption in Entra ID.
The signing of the SAML requests from SonarQube Server to Entra ID. For more information, see Enforce signed SAML authentication requests.
Step 1: Generate the asymmetric key pair and certificate
Generate the asymmetric key pair to use for encryption (PKCS8). The public key should be stored in an X.509 certificate file in .cer
format. You can copy the contents of the certificate file to a text editor and save it as a .cer
file. The certificate file should contain only the public key, not the private key.
Step 2: Configure the security feature(s) in Microsoft Entra ID
Step 3: Configure the security feature(s) in SonarQube Server
To configure the resquest signing and/or the assertion decryption in SonarQube Server:
Go to Administration > Configuration > General Settings > Authentication > SAML.
In SAML Configuration > SAML, select Edit. The Edit SAML configuration dialog opens.
Copy the PKCS8 private key file contents.
Paste it in Service provider private key.
Copy the self-signed certificate contents.
Paste it in Service provider certificate.
To enable the signing of the SAML requests, select in addition the Sign requests option.
Select Save configuration.
Select Test Configuration.
Related pages
Last updated
Was this helpful?