Using SSO with LaunchDarkly
Single sign-on is available to customers on select plans
Single sign-on is only available to customers on select plans. To learn more, read about our pricing. To upgrade your plan, contact Sales.
Overview
This guide provides a high-level overview of the single sign-on (SSO) options you can use to manage access rights in LaunchDarkly.
SSO allows your team to authenticate with LaunchDarkly using the same identity provider (IdP) you use for your other internal and external services. LaunchDarkly implements SSO with the SAML 2.0 protocol. You can use SSO to manage both member login and member roles, or you can use SSO to manage member login only, and continue to manage member roles within LaunchDarkly. To learn more, read Single sign-on.
As a customer on an Enterprise or Guardian plan, after you enable SSO, System for Cross-domain Identity Management (SCIM) becomes available. SCIM facilitates user provisioning, which means your IdP can use it to create, update, and deactivate members in LaunchDarkly. Administrators can optionally turn on and configure team sync with SCIM, which lets admins sync groups in their IdP with LaunchDarkly teams. To learn more, read Enable SCIM provisioning.
Guidelines and strategies
This section includes our recommendations when setting up SSO for your organization.
Use teams
We recommend only assigning teams using SAML and SCIM. This allows you to maintain a simplified mapping of IdP groups to LaunchDarkly teams. You can then assign roles to teams through the LaunchDarkly user interface (UI) or Terraform.
Be mindful of base roles
If you assign preset roles to a member, any base role besides Owner will be ignored. We recommend that you only assign base roles and teams using SAML and SCIM.
Create a sandbox project
We recommend that you create at least one project that is visible to all LaunchDarkly members. This ensures users will not see an error when logging into the platform.
Delegate authority management to teams
Some organizations opt to reduce the overhead of performing team/group mapping in the IdP. Instead, you can assign all members a “sandbox” or “no access” role at the IdP level, and add members to teams using the LaunchDarkly UI. This lets you delegate team membership management to team maintainers, who can add and remove members from teams, but cannot edit the roles or permissions assigned to the teams themselves. To learn more, read Teams.
Configuration options
This section includes SSO attributes, and SAML and SCIM configuration options.
SSO attributes
SAML configuration
SCIM configuration
Further resources
- Single sign-on: LaunchDarkly SSO documentation.
- SCIM: Enable and configure SCIM in LaunchDarkly.
- Test drive mode: Test-drive mode lets you test your SSO integration before deploying.
- Custom attributes: Supported SAML/SCIM attributes.
- Supported IdPs: List of supported IdP integrations.
- Okta: LaunchDarkly Okta integration documentation.
- SAML Tracer Chrome plugin: Chrome Extension that allows you to capture, view and debug SAML requests. Not required.