✅ Info
SAML-based authentication is available exclusively on Self Hosted Enterprise plan and SigNoz Cloud.
Overview
This guide walks you through setting up SSO using Keycloak, a powerful open-source identity and access management solution, with SigNoz.
What you'll accomplish:
- Configure Keycloak as an identity provider (IdP) for SigNoz
- Enable your team to access SigNoz using their existing Keycloak accounts
Prerequisites
Before you begin, ensure you have:
- Keycloak with administrative access
- SigNoz account (Cloud or Self-Hosted with License) with administrative access
- Your SigNoz instance URL (e.g.,
https://signoz.example.com)
Keycloak Configuration Steps
Step 1: Create SigNoz Realm in Keycloak Admin Console

Step 2: Configure a new SAML client
- Navigate to Clients → Create Client
- Select SAML as the client type
- Set Client ID to your SigNoz domain (e.g.,
signoz.example.com)
Step 3: Configure Client Settings
- Set the
Home URLas<your-instance-url>/api/v1/complete/saml - Set the
Valid redirect URIsas<your-instance-url>/*
- Navigate to the
Advancedtab - Set the
Assertion Consumer Service POST Binding URLas<your-instance-url>/api/v1/complete/saml
Step 4: Set up SAML Mappers
- Go to Client Scopes →
signoz.example.com-dedicated - Add these predefined mappers:
- role list
- X500 email
- X500 givenName

Step 5: Configure SAML capabilities
- Set Name ID format to "email"

- Disable Client Signature Required

SigNoz Configuration Steps
Gather SAML Information
- Access Realm Settings → SAML 2.0 Identity Provider Metadata
- Note down:
- SAML ACS URL (ends with
/protocol/saml) - Entity ID
- X.509 certificate

- SAML ACS URL (ends with
Configure SigNoz
- Go to Settings → Organization Settings → Authenticated Domains
- Click on
Add Domainbutton and selectSAML Authentication - Add your email domain (e.g.,
your-domain.com) - Configure SAML settings with collected information
- Enable "Enforce SSO" toggle

Configure IdP-initiated Login
- Go to SigNoz Settings → Organization Settings → Authenticated Domains
- Copy the
IDP Initiated SSO URLof your domain - Go to Keycloak Admin → Open Client settings
- Set the
IDP-Initiated SSO URL nameas some unique idenfier likesignoz-idp - Set the
IDP Initiated SSO Relay Stateas the URL copied in previous steps from SigNoz'sAuthenticated Domainspage
Verify the setup
- Provide access to the Keycloak Realm to some user or create a new one
- Navigate to your SigNoz URL
- Click "Login" → "SSO Login"
- Enter Keycloak credentials when prompted
- Verify successful authentication
To verify IdP-initiated login
- Navigate to
<your-keycloak-domain>/realms/master/protocol/saml/clients/<your-unique-sso-url-name>(likesignoz-idpabove) - Enter Keycloak credentials when prompted
- Verify successful authentication