Configuring SAML for Bugcrowd Tracker
REQUIRED ACCOUNT/PERMISSION LEVEL
Bitium: All account levels; must be an admin to set up
Bugcrowd Tracker: Must be an admin to set up
Go to “Manage Apps.”
Select “Bugcrowd Tracker” from the list of installed apps.
Select the “Single Sign-On” tab.
From the dropdown, select “SAML Authentication.”
Copy the Entity ID, Login URL, Logout URL, and X.509 Certificate from Bitium.
Navigate to Organization Settings by clicking the cog in the upper right corner.
Click on “Authentication” tab.
Click on “Single Sign-on (SSO)”.
Copy the Organization Code from Bugcrowd.
Paste the Entity ID copied from Bitium in Step 5 into the IdP Entity ID field in Bugcrowd.
Paste the Login URL copied from Bitium in Step 5 into the IdP SSO Target URL field in Bugcrowd.
Paste the Logout URL copied from Bitium in Step 5 into the IdP SLO Target URL field in Bugcrowd.
Paste the X.509 Certificate copied from Bitium in Step 5 into the IdP Certificate in Bugcrowd.
- Paste the Organization Code copied from Bugcrowd in step 4 into the Organization field in Bitium.
- Click “Save Changes” in Bitium.
User Role Mapping
Create four Bitium groups for your Bugcrowd Roles, by clicking on “Manage Groups”. For our example, we’ve created groups named Admin, Analyst, Owner, and Viewer, though you can name them anything you’d like.
Assign appropriate users to each of those groups based on their Bugcrowd role.
Navigate to the “Single Sign-On” tab in Bitium.
Create four SAML Role fields (Click “Add another field” to add more than one field). Select the associated group from the dropdown, and choose a name for the attribute.
Click “Save Changes” in Bitium.
Fill in the role names you’ve chosen in the previous step. Make sure these match the attributes you’ve named in Bitium.
Click “Save Authentication Settings” in Bugcrowd.
IDP Initiated Login
- From the Bitium Dashboard, click on the Bugcrowd Tracker app.
- You should be authenticated into the app.
SAML Enabled will be illuminated in green once completed.