KubeadaptDocsBack to site
Sign inStart free
DocsAPI ReferenceCLI
  • Introduction
  • Getting Started
  • Capabilities
    • Connect a cluster
    • Right-size your workloads
    • Monitor GPU workloads
    • Trace cost to a team
    • Plan a safe spot migration
    • Clean up abandoned workloads
    • Invite teammates and set roles
    • Configure SAML SSO
    • Mint an API key
    • Rotate an API key
Docs homev1How To GuidesConfigure Saml Sso

How-to Guides

Configure SAML SSO

Stand up SAML single sign-on with Okta, Entra ID, Google Workspace, or any SAML 2.0 IdP.


Security asks you to retire shared passwords before Q3 close. You have an Okta tenant and the rest of the company already lives there. The SAML SSO wizard in Kubeadapt is two steps: name the connection, paste three values from your identity provider. This guide walks the round trip including the gotchas with metadata imports and IdP-initiated sign-in.

Plan for about ten minutes including the IdP side.


1. Pick a provider and name the connection

SSO tab with Add Connection opening the provider picker (Okta, Entra ID, Google Workspace, Custom SAML)SSO tab with Add Connection opening the provider picker (Okta, Entra ID, Google Workspace, Custom SAML)

Settings → Access Management → SSO tab → Add Connection. Pick one of:

ProviderUse when
Okta WorkforceYour org uses Okta for workforce identity
Microsoft Entra IDFormerly Azure AD
Google WorkspaceGoogle as identity provider
Custom SAML ProviderAny SAML 2.0-compliant IdP (OneLogin, JumpCloud, etc.)

You land on Step 1 of 2. Enter:

  • Connection name — internal label (e.g. Okta — Production)
  • Email domain — the domain that gates this connection (e.g. example.com). Users with email at this domain are routed to this IdP at sign-in.

Step 1 of 2 — Connection name and Email domain fields, then the SP Entity ID and ACS URL ready to copyStep 1 of 2 — Connection name and Email domain fields, then the SP Entity ID and ACS URL ready to copy

Save and Kubeadapt shows you the Kubeadapt-side metadata: Entity ID and ACS URL. Copy both. You need them in your IdP.


2. Create the application on your IdP

The exact path differs per provider, but every one asks for the same two values from Kubeadapt:

  • SP Entity ID (audience)
  • ACS URL (assertion consumer service / reply URL)

Paste them in. Configure the SAML response to send these attributes — Kubeadapt expects exact attribute names:

Kubeadapt fieldSAML attribute name expected
user_iduser_id or NameID (subject)
email_addressemail_address
first_namefirst_name
last_namelast_name

Most IdPs let you map these in the application's attribute statements; in Okta they're under Profile Editor → Attribute Statements, in Entra ID under Single sign-on → Attributes & Claims.

Save the IdP application and download its metadata XML.


3. Complete Step 2 of 2 in Kubeadapt

Step 2 of 2 — Upload metadata XML versus manual IdP Entity ID / SSO URL / certificate fields, plus subdomain and IdP-initiated togglesStep 2 of 2 — Upload metadata XML versus manual IdP Entity ID / SSO URL / certificate fields, plus subdomain and IdP-initiated toggles

Back in Kubeadapt, advance to Step 2 of 2. You have two paths:

  • Upload metadata XML — pastes the IdP metadata you just downloaded and auto-fills the three fields below
  • Fill manually — paste each value yourself

Either way, these three fields must be populated:

  • IdP Entity ID / Issuer URL — the IdP's identifier for itself
  • IdP SSO URL — where Kubeadapt sends the SAML AuthnRequest
  • IdP certificate — the X.509 public certificate the IdP signs assertions with (PEM format, including the -----BEGIN CERTIFICATE----- header)

Then the two toggles on this step:

ToggleWhat it does
Allow SubdomainsPermit users with email at any subdomain of the configured domain (e.g. eu.example.com)
Allow IdP-Initiated LoginPermit sign-in flows that start at your IdP's app launcher

Save. The connection is live.


4. Test the round trip

Open an incognito window. Go to app.kubeadapt.io, click Sign in with SSO, enter an email at the configured domain. You should be redirected to your IdP, authenticate there, and land back in Kubeadapt signed in.

If sign-in fails, the message in the browser tells you which part broke:

  • Issuer mismatch — the IdP Entity ID in Kubeadapt doesn't match what the IdP is sending. Check Step 2 against the metadata XML.
  • Invalid signature — the certificate you pasted doesn't match the one your IdP signs assertions with. Re-download metadata and re-import.
  • Missing required attribute: email_address — your IdP app isn't sending the attribute under the exact name Kubeadapt expects. Fix the attribute mapping on the IdP side.

5. Tune the advanced toggles (optional)

Advanced connection settings — Force Re-Authentication, Sync User Attributes, Disable Additional Identifications togglesAdvanced connection settings — Force Re-Authentication, Sync User Attributes, Disable Additional Identifications toggles

After the connection works, edit it to surface three more toggles for stricter security:

ToggleWhen to turn on
Force Re-AuthenticationCompliance requires fresh IdP authentication on every sign-in
Sync User AttributesYou want first/last name updates to flow from the IdP on every sign-in
Disable Additional IdentificationsBlock linking other identities (e.g. Google) once SAML is in place
Tip

Configure SSO from the same browser session you use to test it. Leave the original admin session signed in on a separate browser — if SSO breaks on a misconfigured cert, you can still fix the connection without locking yourself out.


Next steps

  • Invite teammates — pair SSO with user groups for per-cluster scoping
  • Limits and quotas — SSO is available on plans that include it; check before rolling out

Related

  • Invite teammates
  • Limits and quotas
PreviousInvite teammatesHow-to GuidesNextMint an API keyHow-to Guides

On this page

  • 1. Pick a provider and name the connection
  • 2. Create the application on your IdP
  • 3. Complete Step 2 of 2 in Kubeadapt
  • 4. Test the round trip
  • 5. Tune the advanced toggles (optional)
  • Next steps
Edit this page
Kubeadapt

Kubernetes FinOps platform. Cost visibility, rightsizing, and capacity planning that pays for itself in 30 days.

Product

  • Cost Monitoring
  • Cost Attribution
  • Workload Rightsizing
  • Recommendations
  • Smart Alerting
  • Best Practices
  • Network Cross-AZ

Resources

  • Documentation
  • Status Page
  • Feature Requests

Company

  • About Us
  • Security
  • Careers
  • Contact

© 2026 Kubeadapt. All rights reserved.

PrivacyTermsSecurity