Settings

Google SSO

Make sure the user is first added to the Team page using their Google email address

Step 1: Enable Google SSO in Kscope

  1. Navigate to Kaleidoscope Hub Settings

    Settings
  2. Go to SSO and Click Enabled

    Enable SSO
  3. Click the Copy icon next to Kaleidoscope callback URL and note it down

    Copy URI

Step 2: Create an OAuth client ID in Google Cloud

To be able to use Google SSO, you need to first create an OAuth client ID

In your Google Cloud Console, go to APIs & Services and then Credentials

  1. Click "CREATE CREDENTIALS"

Create Credentials
  1. Then select "OAuth client ID"

Select OAuth Client ID
  1. Select "Web application" from the Application type drop down

Web application

Name it something like kscope-sso

  1. Under "Authorized redirect URIs", add the "Kaleidoscope callback URL" that you copied earlier as a URI and add https://<your_tenant_id>.k6scope.com as a URI under "Authorized JavaScript origins"

Name OAuth Client
  1. After creating the OAuth client, copy the "Client ID" and "Client secret"

Step 3: Add Client ID and Client secret in Kscope

Go back to Kscope and enter Client ID and Client secret that you copied from Google Cloud

Users added to Kscope should now be able to login using their Google credentials

Microsoft SSO

Make sure the user is first added to the Team page using their Microsoft email address

Step 1: Enable Microsoft SSO in Kscope

  1. Navigate to Kaleidoscope Hub Settings, to to SSO and click Enabled and copy Kaleidoscope callback URL

Step 2: Register application in Azure Portal

  1. Go to App registrations in the portal

  2. Click on "New registrations" and call it something like kscope-sso

  3. Keep default settings for "Supported Account types"

  4. For Redirect URI, select "Web" and then enter the URI that you copied from Kscope earlier and click "Register"

Register application
  1. Copy "Directory (tenant) ID" and "Application (client) ID"

  2. Click on "Add a certificate or secret" next to "Client credentials" and then "New client secret"

Create client secret
  1. In "Description" enter "Used for Kscope SSO"

  2. After creating the secret copy its "Value"

  3. Go to "Token configuration" and click on "Add optional claim"

  4. For all 3 types: "ID", "Access", and "SAML", select all claims

Selecting token claims

Step 3: Add Client ID and Client secret in Kscope

Go back to Kscope and enter Tenant Id, Client ID, and Secret Key that you copied from the Azure Portal

Users added to Kscope should now be able to login using their Azure credentials

Last updated

Was this helpful?