To configure SSO in Konnect, you must configure the following in your IdP:
- Add Konnect to your IdP as an application
- Add users that need to use SSO to the IdP tenant.
- Set claims in your IdP
For Okta-specific configuration steps, see the Configure a Konnect application in Okta section on this page.
You can configure Konnect SSO in the following ways:
Note: When you configure the organization login path, enter a unique string that will be used in the URL your users use to log in. For example: examplepath
.
- The path must be unique across all Konnect organizations. If your desired path is already taken, you must to choose another one.
- The path can be any alphanumeric string.
- The path does not require a slash (
/
).
- (SAML only) When you save this configuration, Konnect will generate two new values: a Single Sign-On URL and an Audience URI. In your IdP, update the previous placeholder Single Sign-On URL and Audience URI (SP Entity ID) with the new values generated by Konnect.
When configuring SSO for Dev Portal, it’s important to consider the following points:
- Developers are auto-approved by Konnect when they use SSO to log in to the Dev Portal.
This is because Konnect outsources the approval process to the IdP instance when using SSO. Therefore, you must restrict
who can sign up from the IdP rather than through Konnect.
- If you plan on using team mappings from an IdP,
they must be from the same IdP instance as your SSO.
- If you have multiple Dev Portals, keep in mind that each Dev Portal has a separate SSO configuration.
You can use the same IdP for multiple Dev Portals or different IdPs per Dev Portal.
Important: Keep built-in authentication enabled while you are testing IdP authentication. Only disable built-in authentication after successfully testing IdP authentication.
Depending on your IdP, choose one of the following to test the configuration:
-
Konnect Org: Test the SSO configuration by navigating to the login URI based on the organization login path you set earlier. For example:
https://cloud.konghq.com/login/$YOUR_PATH
, where $YOUR_PATH
is the unique login path string set in the previous steps.
-
Dev Portal: Test the SSO configuration by navigating to the callback URL for your Dev Portal. For example:
https://$YOUR_PORTAL_ID.us.portal.konghq.com/login
.
If the configuration is correct, you will see the IdP sign-in page.
You can now manage your organization’s user permissions entirely from the IdP application.