Datadog - SSO configuration

Datadog - SSO configuration

IdeaNotes
This documentation has been tested and approved by Kelvin Zero's team
Quote
This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Datadog using MPAS. SSO simplifies user authentication by allowing access to multiple applications with a single set of credentials. This integration enhances security and improves user experience across your organization.
Warning
To set up Multi-Pass with Datadog, ensure you meet the following requirements:
- Datadog admin rights and a business plan
- MPAS Admin rights
- Make sure that all users intended to use SSO in Datadog are registered in your IdP and have the necessary permissions to access Datadog.
Important: Custom elements in URLs (like realm names) are case sensitive. Make sure to match the exact casing from your environment.

Datadog - SSO configuration


Step 1: Access SAML Settings in Datadog

  1. In your Datadog dashboard, go to the bottom-left corner and click on your email address.
  2. A new side section will appear. In the Settings space, click on Users.

  1. Click on the Sign-in Method tab.
  2. Scroll down to the SAML section.

  1. Click on Configure.

Step 2: Prepare the Configuration

  1. To link Datadog and MPAS, you will need to:
    1. Download Datadog’s metadata file.

  1. Open the Multi-Pass admin console
    1. Open Multi-Pass Dashboard
    2. Select your dashboard
    3. on the left side click on Admin console

Step 3: Import Datadog Metadata into MPAS

  1. From the MPAS dashboard, click on Advanced Console.
  2. Navigate to Clients > click Import Client.

  1. Upload the Datadog metadata file you just downloaded.
  2. Complete the required fields manually if not pre-filled by the metadata
  3. Click Save
After saving, you'll land on the full client configuration page. Confirm that the metadata populated the required fields, then:
  1. Home URL: https://ca.auth.kzero.com/realms/<your-realm>/protocol/saml/clients/datadog
  2. IDP-Initiated SSO URL Name: datadog
  1. Click Save again.

Step 4: Export MPAS Metadata and Upload to Datadog

  1. In MPAS, go to the left-side menu and click Realm Settings.
  2. Scroll down and click on SAML 2.0 Identity Provider Metadata.

  1. A new browser window will open with the XML metadata.
  2. Right-click > Save As, and save the file with a clear name (e.g., mpas-metadata.xml).
Return to Datadog.
  1. Click Choose File, and upload the MPAS metadata file you just saved.

Info

Congratulations! Your new Single Sign-On (SSO) integration is now complete. You can now enjoy a passwordless login experience with Multi-Pass.

Next Step:

Don’t forget to manage your users in MPAS and assign them the correct access permissions to ensure they can authenticate using the passwordless method.

    • Related Articles

    • SAML SSO Integration Guide

      This guide provides an overview of how to configure SAML Single Sign-On (SSO) between Multi-Pass and a third-party Service Provider (SP). Multi-Pass acts as the Identity Provider (IdP) in this federation model. Multi-Pass is working on SCIM support ...
    • Notion - SSO configuration

      Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This documentation provides a ...
    • Addigy - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Addigy using MPAS. SSO simplifies user authentication by allowing access to multiple ...
    • Kaseya One - SSO configuration

      Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This documentation provides a ...
    • UiPath - SSO configuration

      Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This documentation provides a ...