Files
authentik/website/integrations/services/sentry/index.md
dependabot[bot] 3996bdac33 website: Bump prettier from 3.3.3 to 3.4.1 in /website (#12205)
* website: Bump prettier from 3.3.3 to 3.4.1 in /website

Bumps [prettier](https://github.com/prettier/prettier) from 3.3.3 to 3.4.1.
- [Release notes](https://github.com/prettier/prettier/releases)
- [Changelog](https://github.com/prettier/prettier/blob/main/CHANGELOG.md)
- [Commits](https://github.com/prettier/prettier/compare/3.3.3...3.4.1)

---
updated-dependencies:
- dependency-name: prettier
  dependency-type: direct:development
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>

* update formatting

Signed-off-by: Jens Langhammer <jens@goauthentik.io>

* sigh

Signed-off-by: Jens Langhammer <jens@goauthentik.io>

* disable flaky test

Signed-off-by: Jens Langhammer <jens@goauthentik.io>

---------

Signed-off-by: dependabot[bot] <support@github.com>
Signed-off-by: Jens Langhammer <jens@goauthentik.io>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: Jens Langhammer <jens@goauthentik.io>
2024-11-27 15:14:19 +01:00

1.8 KiB
Raw Blame History

title, sidebar_label
title sidebar_label
Integrate with Sentry Sentry

Sentry

Support level: authentik

What is Sentry

Sentry provides self-hosted and cloud-based error monitoring that helps all software teams discover, triage, and prioritize errors in real-time. One million developers at over fifty thousand companies already ship better software faster with Sentry. Wont you join them?

-- https://sentry.io

Preparation

The following placeholders will be used:

  • sentry.company is the FQDN of the Sentry install.
  • authentik.company is the FQDN of the authentik install.

Create an application in authentik. Create a SAML Provider with the following values

  • ACS URL: https://sentry.company/saml/acs/<sentry organisation name>/
  • Issuer: authentik
  • Service Provider Binding: Post
  • Audience: https://sentry.company/saml/metadata/<sentry organisation name>/

Under Advanced protocol settings, set the following:

  • Signing Certificate: Select any certificate.
  • Property Mapping: Select all Managed Mappings

Sentry

This guide assumes you've installed Sentry using getsentry/self-hosted

Navigate to Settings -> Auth, and click on Configure next to SAML2

In authentik, get the Metadata URL by right-clicking Download Metadata and selecting Copy Link Address, and paste that URL into Sentry.

On the next screen, input these Values

  • IdP User ID: http://schemas.goauthentik.io/2021/02/saml/uid
  • User Email: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress
  • First Name: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

After confirming, Sentry will authenticate with authentik, and you should be redirected back to a page confirming your settings.