Turn any signal into insight and action. See how PagerDuty Digital Operations Management Platform integrates machine data and human intelligence to improve visibility and agility across organizations.
Check out the latest capabilities we released.
Flexible schedules, escalations, & alerting
Automated, best practice incident response
Powerful context & noise reduction at scale
Quantify real-time business & technical impact
Improve with modern, prescriptive insights
Over 300 Integrations
Discover DevOps best practices with our library of webinars, whitepapers, reports, and much more.
Learn best practices and get support help with resources from our award-winning support team.
See how PagerDuty works with our live product demo — twice a week, every week.
We've created a maturity model to assist on the journey to digital operations excellence. Take our short assessment to find out where your team falls!
Interactive, simple-to-use API and technical documentation enables users to easily try updates and extend PagerDuty.
Engage with users and PagerDuty experts from our global community of 200k+ users. Become a member, connect, and share insights for success.
Get all your PagerDuty-related questions answered by exploring our in-depth support documentation and community forums.
In part 2 of our postmortem series, we dig into how to establish a culture of continuous learning, from getting leadership on board to invoking...
PagerDuty helps organizations transform their digital operations. Learn more about PagerDuty's mission and what we do.
Meet our experienced and passionate executive team.
We are risk-taking innovators dedicated to delivering amazing products and delighting customers. Join us and do the best work of your career.
With the PagerDuty Foundation, we are committed to doing our part in giving back to the community.
Use this document to set up your SecureAuth appliance with PagerDuty.
You will need to have an PagerDuty account.
You will need to have access to PagerDuty to have them enable the SSO (SAML) feature.
To configure SecureAuth realm for 2-factor access to PagerDuty, please perform the following steps:
Configuring PagerDuty for SSO (SAML) logins
Click on the SecureAuth realm that is designated for 2-factor access (e.g. SecureAuth2)Click on the Data tab
Assign the AD field (can be any field) that contains the user PagerDuty (that will be federated to PagerDuty) to the SecureAuth field on the left (i.e. “wWWHomePage” AD field is assigned to SecureAuth’s “Email Field 2” field). This assigned SecureAuth field will be selected from the “User ID Mapping” drop down list that is located under Post-Auth tab in later configuration steps.
Click on the SecureAuth realm that is designated for 2-factor access (e.g. SecureAuth2)Click on the Workflow tab (on the Left)
Integration Method = Certificate Enrollment and Validation
Client Side Control = Java Applet
Public/Private Mode = Private and Public Mode
Default Public/Private = Default Private
Remember User Selection =True
Show UserID Textbox =True
Authentication Mode = Standard (User / 2ndFactor / Password)
Validation Cert =True
Renew Cert (After Validation) =False
Allow Restart Login =True
User Impersonation =False
Windows Authentication= False
Configure your Custom Front End Section Settings:
Receive Token = Send Token Only
Require Receive Token = False
Begin Site = _empty_
Token Data Type = UserID
UserID Check = True
Click on the Post Authentication tab:
Authenticated User Redirect = SAML 2.0 (SP Initiated by Post) Assertion Page
User ID Mapping: Select the SecureAuth field from the drop down list that is assigned for the AD user profile field that contains the PagerDuty ID (1st screenshot above, i.e. email2 (wWWHomePage AD field))
WSFed Reply To/SAML Target URL: blank
SAML Consumer URL: (blank)
WSFed/SAML Issuer: A static value that will be provided to PagerDuty in the metadata file, for example:https://secureauth.gosecureauth.com
SAML Recipient: (blank)
SAML Offset Minutes = 5
SAML Valid Hours = 1
Signing Cert Serial Number = Select the certificate that will be used for SAML (fingerprint of this cert will be used on the PagerDuty SAML configuration below)
Go to PagerDuty’s SSO Settings in your control panel. Click on Account Settings > Single Sign-on.
The SAML endpoint URL at the top of the screenshot is the URL you will use to initiate a SSO login using SecureAuth.
Open your exported certificate from the SecureAuth appliance in a text editor and paste the contents into the X.509 Certificate box.
Enter the full URL and Realm of the SecureAuth appliance you are using to login to PagerDuty (e.g. https://sso.company.com/secureauth2/).
Check the box “Turn on Single Sign-on”. You may also check “Allow username/password login” to let users bypass SecureAuth and login directly to PagerDuty.
600 Townsend St., #200
San Francisco, CA 94103
905 King Street West, Suite 600
Toronto, ON, M6K 3G9, Canada
1416 NW 46th St., St. 301
Seattle, WA 98107
5 Martin Place
1 Fore St,
London EC2Y 9DT
© 2009 - 2019