This topic explains how to configure your LaunchDarkly account for SAML SSO.
If you’re a LaunchDarkly administrator or account Owner, you can configure LaunchDarkly to use your IdP when account members authenticate.
This topic includes:
After your configuration is complete, you can enable SSO. Members must then log in through your IdP, rather than the LaunchDarkly login screen.
If needed, you can also disable SSO or change SSO providers.
To set up a LaunchDarkly connection, follow the instructions for your chosen IdP.
We provide support for the following IdPs:
You can only use one identity provider per LaunchDarkly account.
You can use other identity providers with LaunchDarkly, but we do not provide support or configuration guidance for other providers. To learn more, read Supported external identity providers.
To configure SAML within LaunchDarkly:


To complete SAML configuration, follow the instructions specific to your IdP. The list of IdPs we support is in the Overview.
Specific configuration details vary between IdPs, but the basic process is the same regardless of which IdP you use.
To configure LaunchDarkly with an external IdP:
If you choose to encrypt SAML assertions, LaunchDarkly uses a private/public key pair for encryption and provides the public key as an X.509 certificate. You can copy this, upload it into your IdP, and configure your IdP to encrypt SAML assertions.
To encrypt SAML assertions sent by your IdP:
If your SAML certificate expires, you may not be able to log in to your LaunchDarkly account through SSO. If this happens, start a Support ticket.
We will disable SSO for your account, allowing you to log in with your original email and password. If you have only ever logged in through SSO, you can use the “Forgot your password?” link to log in. To learn how, read Resetting your password.
You can then update your SAML certificate and re-enable SSO.
If you choose to enable signed authentication requests, your IdP will have the ability to verify that requests are authentic and originate from LaunchDarkly.
To enable signed authentication requests:
When LaunchDarkly receives a valid SAML configuration, SSO enters test-drive mode. Test-drive mode lets you test the SSO integration before deploying the change to the rest of your organization.
When SSO is in test-drive mode, you can test authentication through your IdP, but LaunchDarkly’s login screen will continue to use regular password-based authentication.
To use SSO in test-drive mode:

If you need to make changes to your setup, you can edit your SAML configuration while in test-drive mode.
After your configuration is working as expected, you can set up user provisioning and enable SSO for your organization. You will automatically exit test-drive mode when you enable SSO.
To exit test-drive mode and keep SSO disabled, delete the SAML configuration metadata from the SAML configuration panel.
LaunchDarkly automatically creates accounts for new account members who sign in through your IdP. Every time an account member signs in, LaunchDarkly also updates the account member’s profile with user attributes from the IdP. To learn more, read Default initial role.
When you have SSO enabled, you cannot add new members through the LaunchDarkly UI. You must add them through your IdP.
New account members will not be able to sign in from LaunchDarkly’s login screen until they have accessed LaunchDarkly through your IdP at least once. To learn how, read Initiating login through your IdP.
You can configure your identity provider to send attributes when the account member signs in to LaunchDarkly. Each attribute is optional. Specify attribute names with the “basic” format. You can also manage custom attributes in LaunchDarkly. To learn how, read Set custom attributes, below.
If SSO is enabled without SCIM provisioning, removing a member from your IdP does not automatically remove the member from LaunchDarkly. You will also need to remove the member in the LaunchDarkly app or using the REST API.
The member will no longer be able to log in to LaunchDarkly, but any access tokens you have created for that member will still be valid. To learn how to remove access tokens, read Cloning and deleting access tokens.
For more information about automatic user provisioning and deprovisioning, read Enable SCIM provisioning.
LaunchDarkly only supports the use of email addresses in the NameID field. Do not use other types of identifying strings.
Below is an example of an SSO-provided nameID that LaunchDarkly will accept:
<saml:NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress">admin@test.com</saml:NameID>
These attributes are available for SAML SSO provisioning and SCIM provisioning:
SAML SSO supports the following naming attributes:
firstNamelastNameSCIM provisioning uses the standard naming attributes:
givenNamefamilyName