OneLogin

Bugcrowd offers a Security Assertion Markup Language (SAML) based Single Sign-On (SSO) integration with OneLogin to help you create an easy and centralized way to log in to Crowdcontrol. This section provides the steps to configure OneLogin.

If you do not have OneLogin set up, see getting started guide.

Specific Role Required to Configure SSO: To configure SSO for your program, you must be an Organization Owner. Organization Owners can log in using Username and Password.

Adding Bugcrowd to Your OneLogin Apps Portal

  1. Log in to your OneLogin account.

  2. Select Apps > Add Apps.

    add-apps

  3. Search for Bugcrowd.

    search Bugcrowd

  4. Select the Bugcrowd app.

    select Bugcrowd app

    The Configuration page is displayed.

  5. Modify any of the configuration settings that control how the Bugcrowd app appears in your portal and the connector version you want to use. Select SAML 2.0 as your connector.

    configuration

  6. Save the settings.

    A new set of tabs appear that allow you to configure rules, parameters, SSO, access policies, and users for the Bugcrowd app.

  7. Select the SSO tab.

    cerificate-signature

  8. Select X.509 Certificate (View Details) for additional information.

    • Use SHA1
    • X.509 Certificate

    x509-certificate

    This page displays all the information that is required for adding to Crowdcontrol later. Make a note of the following information:

    • X.509 certificate and its fingerprint
    • Issuer URL
    • SAML 2.0 endpoint
    • SLO endpoint

Mapping OneLogin to Crowdcontrol

  1. Navigate to the Single Sign-On screen in Crowdcontrol and scroll to the SAML Settings section.

  2. Specify in the information you had notes from OneLogin in the earlier section.

    saml-settings

    Single Logout: Bugcrowd only supports logouts Identity Provider (IdP) initiated logouts, that is logging out of Bugcrowd will not log you out of your SSO provider.

    The following table provides the Crowdcontrol fields mapped to OneLogin fields.

    Crowdcontrol Field OneLogin Field
    IdP Certificate X.509 Certificate
    IdP Certificate Fingerprint Fingerprint
    IdP Entity ID Unresolved
    IdP SSO Target URL SAML 2.0 endpoint
    IdP SLP Target URL SLO endpoint

    When you add the X.509 certificate, you must copy and paste the entire contents of the certificate, including the BEGIN and END headers as shown.

       -----BEGIN CERTIFICATE-----\nTTDMTSCCAkWgAwIBAgIJAJC1HiIAZAiIMA0GCSqGSIb3DQEBBQUAMEUxCzAJBgNV\nm3LtH40luvg0sd0ng4evAT0mMYh4rdYDApTb21lLVN0YXRlMSEwHwYDVQQKDBhJbnRlcm5ldCBX\naWRnaXRzIFB0eSBMdGQwHhcNMTExMjMxMDg1OTQ0WhcNMTIxMjMwMDg1OTQ0WjBF \nt4c0fN746vaInA1KxYEeI1Rx5KXY8zIdj6a7hhphpj2E04LDdw7r495dv3UgEgpR\nC3Fayua4DRHyZOLmlvQ6tIChY0ClXXuefbmVSDeUHwc8YufRAERp2GfQnL2JlPUL\nB7xxt8BVc69rLeHV15A0qyx77CLSj3tCx2IUXVqRs5mlSbq094NBxsauYcm0A6Jq\nvA==
       -----END CERTIFICATE-----
    
  3. Save the settings. Crowdcontrol displays the SSO configuration for your program.

  4. Copy the OneLogin SAML Code.

    sample-code

  5. Go back to your OneLogin account and navigate to the Bugcrowd Configuration tab. Paste the OneLogin SAML Code.

    configuration-page

    Domain verification is required for SSO to function properly. For more information, see verifying domain.

Logging in Using SSO

After you have enabled SSO, your team members can navigate to the Company Apps area of OneLogin and click the Bugcrowd app to log in. If SSO is set up properly, members will be logged in to Crowdcontrol.

example-program


Onboarding
Account Management
Program Management
Reporting
Submission Management
Integration Management