Files
authentik/docs/integrations/monitoring/sentry/index.md
Teffen Ellis 582812b3ec website: Flesh out docs split.
website: Copy files during build.

website: Allow for mixed env builds.

website: Reduce build size.

website: Expose build.

website: Add build memory debugging.

WIP: Disable broken links check to compare memory usage.

website: Update deps.

website: Clean up API paths.

website: Flesh out 3.8 fixes.

Format.

website: Update ignore paths.

Website: Clean up integrations build.

website: Fix paths.

website: Optimize remark.

website: Update deps.

website: Format.

website: Remove linking.

website: Fix paths.

wip: Attempt API only build.

Prep.

Migrate render to runtime. Tidy sidebar.

Clean up templates.

docs: Move directory. WIP

docs: Flesh out split.

website: Fix issue where routes have collisions.
2025-07-01 21:53:19 +02:00

2.0 KiB
Raw Blame History

title, sidebar_label, support_level
title sidebar_label support_level
Integrate with Sentry Sentry authentik

What is Sentry

Sentry provides self-hosted and cloud-based error monitoring that helps all software teams discover, triage, and prioritize errors in real-time. One million developers at over fifty thousand companies already ship better software faster with Sentry. Wont you join them?

-- https://sentry.io

Preparation

The following placeholders are used in this guide:

  • sentry.company is the FQDN of the Sentry installation.
  • authentik.company is the FQDN of the authentik installation.

:::note This documentation lists only the settings that you need to change from their default values. Be aware that any changes other than those explicitly mentioned in this guide could cause issues accessing your application. :::

Create an application in authentik. Create a SAML Provider with the following values

  • ACS URL: https://sentry.company/saml/acs/<sentry organisation name>/
  • Issuer: authentik
  • Service Provider Binding: Post
  • Audience: https://sentry.company/saml/metadata/<sentry organisation name>/

Under Advanced protocol settings, set the following:

  • Signing Certificate: Select any certificate.
  • Property Mapping: Select all Managed Mappings

Sentry

This guide assumes you've installed Sentry using getsentry/self-hosted

Navigate to Settings -> Auth, and click on Configure next to SAML2

In authentik, get the Metadata URL by right-clicking Download Metadata and selecting Copy Link Address, and paste that URL into Sentry.

On the next screen, input these Values

  • IdP User ID: http://schemas.goauthentik.io/2021/02/saml/uid
  • User Email: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress
  • First Name: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

After confirming, Sentry will authenticate with authentik, and you should be redirected back to a page confirming your settings.