Skip to main content

LambdaTest SSO & OneLogin Using SAML


LambdaTest allows you to integrate an external user directory with your LambdaTest Organization through an IDP so that your team could leverage the Single Sign-on setup. This document will help you integrate your LambdaTest organization with your OneLogin identity provider to configure SSO(Single sign-on).

Prerequisites


To set-up and use OneLogin & LambdaTest Single Sign-on (SSO) feature:

  • An Enterprise plan with LambdaTest. ( Learn how to manage your subscriptions. )
  • The Admin level access to your LambdaTest organization.
  • The Admin level access of your organization’s OneLogin instance

Configure LambdaTest SSO & OneLogin Integration


Important Note: Once SSO is setup successfully for your LambdaTest organization then the colleagues would neither be able to login via their Google Auth nor by using login credentials for their LambdaTest account. Email invites for adding new members to the LambdaTest organization, won't work anymore as well.

Follow the below steps to configure LambdaTest SSO & OneLogin Integration

Step 1: Add LambdaTest App to your enterprise's OneLogin SSO page


To configure the LambdaTest SSO and OneLogin Integration, the organization's admin must log into the OneLogin Identity Provider’s SSO page and then follow the below steps to complete the integration:

  1. Log in to the OneLogin Dashboard.
lambdatest onlogin integration2. Go to Applicationslambdatest onlogin integration3. Add a new Application, by clicking on Add App.lambdatest onlogin integration4. Search for SAML Test Connector and select **Add SAML Test Connector (Advanced)**lambdatest onlogin integration5. In the window that appears, choose a suitable name for your app, and **save**.lambdatest onlogin integration

Step 2: Integrate the newly created app with LambdaTest SSO


Your enterprise SSO account will be created at OneLogin. Now to enable this SSO at LambdaTest, you need to fetch the below details and pass it on to the LambdaTest team.

  1. Go to the SSO tab, and after you choose SAML Signature Algorithm to SHA-256, copy the values for SAML 2.0 Endpoint (HTTP) and SLO Endpoint (HTTP). Once done, click on Save.
lambdatest onlogin integration
  1. Now, click on the View Details link at the X.509 certificate field.
lambdatest onlogin integration
  1. In the window that opens, make sure the SHA fingerprint is SHA256, and download the X.509 certificate as a .pem file. Once done, click on Save.
lambdatest onlogin integration
  1. Now Click on the Parameters tab and set the user attributes to the following values:lambdatest onlogin integration

Step 3: Authenticate and complete LambdaTest SSO & OneLogin integration


Upon reviewing the data, the LambdaTest team will revert you with details of your LambdaTest SSO & OneLogin integration. Once you receive the details:

  1. Re-login to your enterprise's OneLogin dashboard, and go to applications.
lambdatest onlogin integration
  1. Choose the previously created app (created in Step 1).
lambdatest onlogin integration
  1. In the window that appears, go to Configurations tab, and update the details received.
lambdatest onlogin integration For example, below are sample details to be updated in the Configurations section:
```Audience (EntityID):     urn:auth0:{tenantID}:{ConnectionName}
Recipient: https://{tenantID}.us.auth0.com/login/callback?connection={ConnectionName}
ACS (Consumer) URL Validator: [-a-zA-Z0-9@:%.+~#=]{2,256}.[a-z]{2,6}\b([-a-zA-Z0-9@:%+.~#?&//=]*)
ACS (Consumer) URL: https://{tenantID}.us.auth0.com/login/callback?connection={ConnectionName}
Login URL: https://accounts.lambdatest.com/auth0/{version}/login
SAML initiator: Service Provider
SAML nameID format: Email
SAML issuer type: Specific
SAML signature element: Response
Encrypt assertion: false (unchecked)

That's it. Your enterprise's LambdaTest SSO and OneLogin has been integrated successfully. If you face any challenge, or come across any issues, please feel free to contact our Support Team. You can even mail us at support@lambdatest.com. Happy Testing!