Grafana - SSO configuration

Grafana - SSO configuration

Alert
Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk.
Quote
This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Grafana using MPAS. SSO simplifies user authentication by allowing access to multiple applications with a single set of credentials. This integration enhances security and improves user experience across your organization
Warning
To set up Multi-Pass with  Grafana, ensure you meet the following requirements:
-  Grafana admin rights
- MPAS Admin rights
- Make sure that all users intended to use SSO in Grafana are registered in your IdP and have the necessary permissions to access Grafana.
Important: Custom elements in URLs (like realm names) are case sensitive. Make sure to match the exact casing from your environment.



Grafana - SSO configuration




Step 1 - Grafana Configuration (Service Provider)

  1. Sign in to Grafana as an administrator.
  2. Go to Administration, click on Authentication
  3. Select SAML and enable SAML Authentication.
  4. In Service Provider, note the values below (you will need them in MPAS):
FieldValue
SP Entity IDgrafana-saml (or a custom value). Some setups use the metadata URL: https://<grafana-domain>/saml/metadata
Assertion Consumer Service (ACS) URLhttps://<grafana-domain>/login/saml
SP Metadata URLhttps://<grafana-domain>/saml/metadata (optional to share with MPAS)
Single Logout URL (optional)(optional)
  1. In Identity Provider (IdP) Settings, provide MPAS details when available:
    1. IdP Metadata URL or upload the IdP Metadata XML from MPAS
    2. IdP Entity ID, SSO URL, and X.509 Certificate (PEM)
  2. Save configuration.

Section 2 — Multi‑Pass (MPAS) Configuration (Identity Provider)

  1. Open Multi-Pass Dashboard
  1. Select your tenant, on the left click on Integrations and then on Applications
  2. Scroll to select SAML
  1. Fill in the SAML app using the Grafana SP values:
FieldValue
SP Entity IDgrafana-saml (or a custom value). Some setups use the metadata URL: https://<grafana-domain>/saml/metadata
  Name
 For example "Grafana"
  Description
 For example "SSO integration"
Assertion Consumer Service (ACS) URLhttps://<grafana-domain>/login/saml
SP Metadata URLhttps://<grafana-domain>/saml/metadata

  1. Or click on the right top corner of your form on "upload" and add the metadata from Grafana that you can find : 
    1. https://<grafana-domain>/saml/metadata

  1. Now click on add integration.
  2. Move to the advanced console by clicking on "Advanced console" on the right side. 
  3. Click on Client and use the search bar to find Grafana
  4. Make sure all the fields are completed : 
General access
FieldValue
Client IDhttps://grafana-domain.com
Namegrafana
DescriptionSSO integration
Always display in UIOn

Access Settings
SAML Capabilities
FieldValue
Name ID formatemail
Force name ID formatOn
Force POST bindingOn
Include AuthnStatementOn

Signature and Encryption
FieldValue
Sign AssertionsOn
Sign DocumentsOff
  1. Move to the tab called "keys" and make sure that both parameters are switched to OFF
  2. Move to the tab "advanced"
    1. Assertion Consumer Service POST Binding URL = Valid redirect URIs = https://grafana-domain/login/saml
  3. Under Client Scopes / Mappers, add user attribute mappers if needed:
    1. username → SAML Attribute username
    2. email → SAML Attribute email
    3. FirstName / lastName → SAML Attributes firstName / lastName
    4. groups → SAML Attribute groups
Attribute Mapping
MPAS AttributeGrafana Mapping
usernameNameID / assertion_attribute_login
emailassertion_attribute_email (recommended)
firstName + lastNameassertion_attribute_name (ex: “FirstName LastName”)
groupsassertion_attribute_groups (for role/team mapping in Grafana)

Test & Troubleshooting

  • From Grafana login page, initiate SSO and verify redirection to MPAS, then back to Grafana.
  • Check that the created user in Grafana has the expected login/email/name and (optionally) groups.
  • If login fails, verify:
    • SP Entity ID and ACS URL match between Grafana and MPAS
    • X.509 certificate (PEM) validity
    • NameID format consistency (username vs email)
    • Bindings (POST) and signing options






    • Related Articles

    • Wrike - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Wrike using MPAS. SSO simplifies user authentication by allowing access to multiple ...
    • SAML SSO Integration Guide

      This guide provides an overview of how to configure SAML Single Sign-On (SSO) between Multi-Pass and a third-party Service Provider (SP). Multi-Pass acts as the Identity Provider (IdP) in this federation model. Multi-Pass is working on SCIM support ...
    • Slack - SSO configuration

      Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This documentation provides a ...
    • Notion - SSO configuration

      Please note that this application has not been formally tested by Kelvin Zero Inc. It is provided solely as a reference guide. If you encounter any issues, kindly submit a ticket directly through the support desk. This documentation provides a ...
    • Addigy - SSO configuration

      This documentation has been tested and approved by Kelvin Zero's team This documentation provides a step-by-step guide to setting up Single Sign-On (SSO) for Addigy using MPAS. SSO simplifies user authentication by allowing access to multiple ...