Qase Docs
Help CenterAPI DocsRoadmapSign up for free
  • General
    • Qase docs
    • Get started with the Qase platform
      • Account settings
      • Projects
      • Test suites
      • Test cases
        • Test Case Parameters
        • Test case review
        • Shared steps
        • Import test cases
        • Export test cases
        • Trash bin
        • Muted Tests
        • System fields
        • Nested steps
        • Test case actions
        • Filters
      • Requirements Traceability Report
      • AI Test Case Generator
    • Execute testing
      • Test plan
      • Test runs
      • Configurations
      • Environments
    • Issues tracking
      • Defects
      • Milestones
      • Requirements
    • Analytics
      • Dashboards
      • Queries (QQL, Qase Query Language)
      • Saved queries
    • Webhooks
      • Test Case
      • Test suite
      • Test plan
      • Shared step
      • Milestone
      • Custom field
      • Test run
      • Defect
      • Test review
  • AIDEN
    • AIDEN - QA Architect
  • Guide: Action editor
  • Administration
    • Workspace management
      • Users
      • Invites
      • Groups
      • Roles
      • Fields
      • Custom fields
      • Notifications
      • Tags
      • Attachments
      • Audit logs
      • Hotkeys
    • SSO / SAML instructions
      • AzureAD
      • OneLogin
      • Google Workspace
      • Okta
      • JumpCloud
    • SCIM
      • User lifecycle management with SCIM
      • Enable SCIM
      • Users
      • Discovery features
      • Errors
    • Security
      • SOC 2 Type II / SOC 3
      • ISO/IEC 27001:2022
      • Penetration testing report
      • Subprocessors
      • Qase IP addresses
    • Billing
      • Billing options
    • Subscriptions
      • Free plan
      • Startup plan
      • Business plan
      • Enterprise plan
  • Apps
    • Issue tracking
      • Jira Cloud
      • Jira Server/Datacenter Plugin installation
      • GitHub
      • Asana
      • Linear
      • Monday
      • ClickUp
      • Trello
      • Azure DevOps
      • GitLab
      • YouTrack
      • Redmine
    • CI/CD
      • Jenkins
      • BitBucket
      • GitHub CI
      • GitLab CI
    • Chats
      • Slack
  • Automation
    • Qase API
    • Reporters
      • JavaScript
        • Playwright
        • Cypress
        • Mocha
        • Newman
        • Jest
        • WebDriverIO
        • CucumberJS
        • TestCafe
      • Python
        • Pytest
        • Robot Framework
        • Behave
        • Tavern
      • Java
        • TestNG
        • JUnit 4
        • JUnit 5
        • Cucumber 3 (jvm)
        • Cucumber 4 (jvm)
        • Cucumber 5 (jvm)
        • Cucumber 6 (jvm)
        • Cucumber 7 (jvm)
      • PHP
        • PHPUnit
        • Codeception
      • Kotlin
        • Kaspresso
    • Qase CLI App
      • XCTest
Powered by GitBook
On this page
  1. Administration
  2. SSO / SAML instructions

AzureAD

PreviousSSO / SAML instructionsNextOneLogin

Last updated 2 months ago

Qase supports SSO. To provide single sign-on services for your domain, Qase acts as a service provider (SP) through the SAML (Secure Assertion Markup Language) standard.

How to configure SSO with AzureAD?

1. Sign in to the of your AzureAD account.

2. Click on "Azure Active Directory" icon:

3. Go to "Enterprise applications" section and click on "New application" button:

4. Create a Non-gallery application and name it 'Qase':

5. Click on "Set up single sign on":

6. Choose "SAML":

7. Now, you need to set up your AzureAD application. Click on the "Edit" button in the "Basic SAML Configuration" block. And fill the form with the following data:

When you are ready, click on "Save" button.

8. Now you need to configure attribute mapping. Click on "Edit" button in "User Attributes & Claims" section and for "Required claim" set Name ID format to persistent and Name ID value to user.mail.

Also, add two new claims:

  • fname: user.givenname

  • lname: user.surname

9. Now, you are ready to set up SSO on the Qase side. But at first, you need to get data from the AzureAD app:

  1. Download the certificate (Base64)

  2. Copy Login URL

  3. Copy Azure AD identifier

  • SAML Sign-in URL: paste login URL from the previous step

  • Identity Provider Issuer: paste Azure AD identifier from the previous step

  • Key x509 Certificate: open downloaded in the previous certificate in any editor, copy its content, and paste in the textarea.

  • Domains*: provide a list of domains separated by a comma, that will be used for SSO. Public domains like gmail, hotmail, and etc are not allowed. *This step is mandatory.

Any domains that are added will need to be verified. To do so, you will need to add a TXT record to the domain's DNS records.

  • Default role: choose a default role that will be granted to the new users.

If you want new users who join your team to become a read-only by default, check "Automatically add new users as read-only members" checkbox.

After the form is filled, click on the "Save" button.

IdP initiated login is not supported.

Identifier (Entity ID):

Reply URL (ACS URL):

Sign on URL:

10. Now you need to go to the Qase and link your account with AzureAD credentials. Click on the "Enable SSO/SAML" toggle button and fill the form:

Setup is complete. Now you can logout from the app and log in through the

Users will have to sign-in from this Qase's SSO Login page:

https://app.qase.io/saml/metadata
https://app.qase.io/saml/acs
https://app.qase.io/sso/login
security page
SSO login form.
https://app.qase.io/sso/login
Admin console