Authentication and Authorization (SaaS)
Sysdig Monitor and Sysdig Secure are designed to work with several user authentication/authorization methods:
Type | Enabled by Default | Integration Steps Required |
---|---|---|
User email/password | Yes | No |
Google OAuth | No | No |
SAML | No | Yes |
OpenID Connect | No | Yes |
The user’s view:

The pages in this section describe the integration and enablement steps required for SAML or OpenID Connect, and the Identity Provider (IdP) services that support these protocols, such as Okta, OneLogin, Keycloak.
In the SaaS environment, Google login can be enabled with a simple drop-down selection; the integration has already been performed.
See SaaS Regions and IP Ranges before proceeding to configure authentication.
To integrate SAML or OpenID Connect with both Sysdig Monitor and Sysdig Secure, you must go through the integration steps twice, once for each Sysdig product.
Workflow
With the new Authorization UI, the basic process of enabling a Single Sign-On (SSO) option is:
Determine which SSO option (GoogleOAuth, SAML, OpenID) your enterprise uses, and which IdP service (Okta, OneLogin, etc.) is used, if any.
Enter the required connection settings for the chosen SSO on the appropriate
Authentication
tab. (Note: for Google, the settings are already entered.)Configure any associated IdP settings on the IdP side.
Select the SSO option from the
Enabled Single Sign-On
drop-down and clickSave
Authentication.If enabling for both Sysdig Monitor and Sysdig Secure, repeat the process on the second application.

View of the Authentication page for Google OAuth in the SaaS environment.
Feedback
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.