Files
authentik/website/integrations/services/sonar-qube/index.md
4d62 d111740f6b website/integrations: all: install -> installation (#12676)
* website/integrations: all: install -> installation

* fix for new integr 

Signed-off-by: 4d62 <git@sdko.org>

---------

Signed-off-by: 4d62 <git@sdko.org>
2025-01-16 16:23:22 -06:00

2.2 KiB

title, sidebar_label
title sidebar_label
Integrate with SonarQube SonarQube

SonarQube

Support level: Community

What is SonarQube

Self-managed static analysis tool for continuous codebase inspection

-- https://www.sonarsource.com/products/sonarqube/

Preparation

The following placeholders are used in this guide:

  • sonarqube.company is the FQDN of the sonarqube installation.
  • authentik.company is the FQDN of the authentik installation.

Terraform provider

Create an application in authentik. Create a SAML Provider with the following values


data "authentik_flow" "default-provider-authorization-implicit-consent" {
  slug = "default-provider-authorization-implicit-consent"
}

data "authentik_property_mapping_saml" "saml-sonar-qube" {
  managed_list = [
    "goauthentik.io/providers/saml/email",
    "goauthentik.io/providers/saml/username",
    "goauthentik.io/providers/saml/name"
  ]
}

resource "authentik_provider_saml" "provider_sonar-qube" {
    name                = "SonarQube"

    authorization_flow  = data.authentik_flow.default-provider-authorization-implicit-consent.id

    acs_url    = "https://sonarqube.company/oauth2/callback/saml"
    issuer     = "https://authentik.company/"
    sp_binding = "post"
    audience   = "https://sonarqube.company/saml2/metadata"

    property_mappings = data.authentik_property_mapping_saml.saml-sonar-qube.ids
}

resource "authentik_application" "application_sonar-qube" {
    name              = "SonarQube"
    slug              = "sonarqube"
    protocol_provider = authentik_provider_saml.provider_sonar-qube.id
}

SonarQube

Navigate to Administration -> Configuration -> Authentication -> Saml

Input these Values