Settings
Google SSO
Make sure the user is first added to the Team page using their Google email address
Step 1: Enable Google SSO in Kscope
Navigate to Kaleidoscope Hub Settings
Settings Go to SSO and Click Enabled
Enable SSO Click the Copy icon next to Kaleidoscope callback URL and note it down
Copy URI
Step 2: Create an OAuth client ID in Google Cloud
To be able to use Google SSO, you need to first create an OAuth client ID
In your Google Cloud Console, go to APIs & Services and then Credentials
Click "CREATE CREDENTIALS"

Then select "OAuth client ID"

Select "Web application" from the Application type drop down

Name it something like kscope-sso
Under "Authorized redirect URIs", add the "Kaleidoscope callback URL" that you copied earlier as a URI and add
https://<your_tenant_id>.k6scope.com
as a URI under "Authorized JavaScript origins"

After creating the OAuth client, copy the "Client ID" and "Client secret"
Step 3: Add Client ID and Client secret in Kscope
Go back to Kscope and enter Client ID and Client secret that you copied from Google Cloud
Users added to Kscope should now be able to login using their Google credentials
Microsoft SSO
Make sure the user is first added to the Team page using their Microsoft email address
Step 1: Enable Microsoft SSO in Kscope
Navigate to Kaleidoscope Hub Settings, to to SSO and click Enabled and copy Kaleidoscope callback URL
Step 2: Register application in Azure Portal
Go to App registrations in the portal
Click on "New registrations" and call it something like
kscope-sso
Keep default settings for "Supported Account types"
For Redirect URI, select "Web" and then enter the URI that you copied from Kscope earlier and click "Register"

Copy "Directory (tenant) ID" and "Application (client) ID"
Click on "Add a certificate or secret" next to "Client credentials" and then "New client secret"

In "Description" enter "Used for Kscope SSO"
After creating the secret copy its "Value"
Go to "Token configuration" and click on "Add optional claim"
For all 3 types: "ID", "Access", and "SAML", select all claims

Step 3: Add Client ID and Client secret in Kscope
Go back to Kscope and enter Tenant Id, Client ID, and Secret Key that you copied from the Azure Portal
Users added to Kscope should now be able to login using their Azure credentials
Last updated
Was this helpful?