Authentik SAML SSO

Learn how to create a custom Authentik SAML application for Doppler Single Sign-On.

Requirements

1. Initial Doppler SAML SSO Configuration

Go to the Doppler dashboard and from the menu click Team, then select the Roles tab from the top menu. Choose the Default Roles for users who login via SSO.

πŸ“˜

The Workplace Role controls the initial permissions a user will receive when their account is created. We recommend keeping it at Collaborator access to follow the principle of least privilege. The Project Role is the role granted to a user when they're added to a project, so set this to the role most commonly used. Users with the Owner role can adjust these after the user has logged in once. If you scroll down further on the Roles page, you'll see a breakdown of what permissions each Role has.

1201

After setting the Default Roles, we need to enable SAML SSO in Doppler to get access to the URLs needed to configure the third party SAML SSO application.

Select the SSO tab from the top menu and scroll down to the SAML Single Sign-On section. Click the Add SAML button.

Next, choose a verified domain from the dropdown menu and click Save.

The domain you selected should show up now in the Inactive state. Click on the three dot menu and choose the Edit option.

Copy the ACS URL and Entity ID URLs in the edit drawer that appears for use when configuring the third party SAML SSO application.

2. Create SAML Property Mappings

In a separate window, browse to your Authentik admin interface and browse to the Customisation > Property Mappings section from the left sidebar, then click the Create button. Select SAML Property Mapping and then click Next.

Then use the following values to create the property and click Finish.

ParameterValue
NameDoppler Name
SAML Attribute Namename
Expressionreturn request.user.name

Create a second property using the following values:

ParameterValue
NameDoppler Email
SAML Attribute Nameemail
Expressionreturn request.user.email

3. Create SAML Provider

Next, browse to the Applications > Providers section from the left sidebar, then click the Create button. Select SAML Provider and then click Next.

Populate the form with the URLs obtained from the Doppler SAML Single Sign-On setup page in Step 1 above and the other values shown below:

ParameterValue
Namedoppler-saml
Authentication flowdefault-authentication-flow
Authorization flowdefault-provider-authorization-implicit-consent
ACS URLhttps://dashboard.doppler.com/login/sso/callback/$UUID
Issuerhttps://dashboard.doppler.com/login/sso/saml/metadata/$UUID
Service Provider BindingPost
Signing CertificateEither the default, or whichever you'd like to use (but one must be selected).
Property MappingDoppler Name, Doppler Email
NameID PropertyDoppler Email

❗️

The ACS URL and Issuer are example URLs only and will not work in your setup. You need to use the URLs obtained from the Doppler SAML Single Sign-On setup page referenced in Step 1 above.

Be sure to leave the Verification Certificate field blank (which is the default), then click the Finish button.

4. Create SAML Application

Click the Create button under the "Assigned to application" heading that's now showing for the doppler-saml provider in Authentik.

Populate the form with the information pictured below and then click the Create button:

ParameterValue
NameDoppler
Slugdoppler
Providerdoppler-saml
IconDoppler Logo (use this logo or one of your choosing)

Browse back to the doppler-saml provider page under Applications > Providers and click the Download button under the Metadata section. The contents of the resulting XML file will be used in the next step.

5. Update Doppler SAML SSO Configuration

Navigate to the Doppler Team page and click on the SSO tab.

Scroll down to the SAML Single Sign-On section, click on the three dot menu, and choose the Edit option. Paste in the IDP XML metadata, check the Enabled field, then click the Save button.

You're now ready to start using your Authentik SSO application!

πŸ‘

Awesome Work!

Your custom Authentik Doppler SAML application is now set up!