PagerDuty
  Last reviewed:  8 months ago  
 This guide covers how to configure PagerDuty ↗ as a SAML application in Cloudflare Zero Trust.
- An identity provider configured in Cloudflare Zero Trust
 - Admin access to a PagerDuty site
 
- In Zero Trust ↗, go to Access > Applications.
 - Select Add an application > SaaS.
 - For Application, select Pagerduty.
 - For the authentication protocol, select SAML.
 - Select Add application.
 - Fill in the following fields:
- Entity ID: 
https://<your-subdomain>.pagerduty.com - Assertion Consumer Service URL: 
https://<your-subdomain>.pagerduty.com/sso/saml/consume - Name ID format: Email
 
 - Entity ID: 
 - Copy the SSO endpoint and Public key.
 - Select Save configuration.
 - Configure Access policies for the application.
 - Select Done.
 
- Paste the Public key in a text editor.
 - Amend the public key so each row is a maxiumum of 64 characters long. Originally, each full row of the public key is 65 characters long.
 - Wrap the certificate in 
-----BEGIN CERTIFICATE-----and-----END CERTIFICATE-----. 
- In PagerDuty, select your profile picture and go to Account Settings > Single Sign-on.
 - Turn on SAML.
 - In X.509 Certificate, paste the entire x.509 certificate from step 2. Create a x.509 certificate.
 - In Login URL, paste the SSO endpoint from application configuration in Cloudflare Zero Trust.
 - Select Save Changes.
 
- Open an incognito window and paste your PagerDuty URL into the address bar. Select Sign Ian With Single Sign-On. You will be redirected to the Cloudflare Access login screen and prompted to sign in with your identity provider.
 - In an incognito window, paste your PagerDuty URL and select Sign In With Single Sign-On. You will be redirected to the Cloudflare Access login screen and prompted to sign in with your identity provider.
 - Once SSO sign in is successful, select your profile picture and go to Account Settings > Single Sign-on.
 - Turn off Allow username/password login and select Save Changes. Now, users will only be able to sign in with SSO.