{"id":72497,"date":"2025-06-04T13:52:26","date_gmt":"2025-06-04T08:22:26","guid":{"rendered":"https:\/\/www.tothenew.com\/blog\/?p=72497"},"modified":"2025-06-04T16:46:34","modified_gmt":"2025-06-04T11:16:34","slug":"sonarqube-azure-entra-id-saml-authentication-step-by-step-guide","status":"publish","type":"post","link":"https:\/\/www.tothenew.com\/blog\/sonarqube-azure-entra-id-saml-authentication-step-by-step-guide\/","title":{"rendered":"Cut admin overhead: Azure SAML-based SSO for SonarQube saves time and risk"},"content":{"rendered":"<h1>Introduction<\/h1>\n<p>This article will help you through setting up SAML-based SSO between SonarQube and Azure Entra ID. You may simplify access control for your SonarQube instance, increase security, and expedite user authentication by turning on SSO. Additionally, it guarantees centralised identity control and lowers the overhead associated with maintaining local SonarQube accounts. This integration will make it easier for your team to utilise SonarQube, whether you&#8217;re using it for DevOps pipelines, security scanning, or code quality.<\/p>\n<p>&nbsp;<\/p>\n<h1><strong>Prerequisites<\/strong><\/h1>\n<ul>\n<li>A running instance of SonarQube (Developer Edition or higher).<\/li>\n<li>Access to Azure Portal with permissions to register applications in Azure Entra ID.<\/li>\n<li>Admin access to the SonarQube instance.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><strong>NOTE<\/strong><\/h3>\n<p>To integrate Azure Entra ID (Identity Provider) with SonarQube (Service Provider), both sides need to be configured:<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>In SonarQube : Navigate to <strong>Administration &gt; Authentication &gt; SAML<\/strong><\/li>\n<li>In Azure Entra ID: Log in and go to <strong>Azure Entra ID &gt; Enterprise Applications<\/strong><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h1>Use Case<\/h1>\n<p>You\u2019re managing code quality and security across multiple teams using SonarQube, and your organization already uses Azure Entra ID for centralized identity and access management.<br \/>\nBy enabling SAML-based Single Sign-On (SSO) between Azure Entra ID and SonarQube, you want to:<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Simplify and secure user access with corporate credentials.<\/li>\n<li>Avoid managing local SonarQube user accounts.<\/li>\n<li>Ensure access control aligns with organization-wide security policies.<\/li>\n<li>Streamline onboarding\/offboarding processes across projects and teams.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>This guide walks you through enabling SAML-based SSO, ensuring a seamless and secure login experience for your developers and administrators.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2>Configure Azure Entra ID Enterprise App for SonarQube<\/h2>\n<p>&nbsp;<\/p>\n<ol>\n<li><strong>Register the Sonarqube Application in Azure Entra ID<\/strong><\/li>\n<\/ol>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul style=\"list-style-type: circle;\">\n<li>Setup the Sonarqube Application\n<ul>\n<li>Go to Azure Portal<\/li>\n<li>In Azure Entra ID, navigate to Enterprise applications and add a New Application.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-72490 size-full\" src=\"https:\/\/www.tothenew.com\/blog\/wp-ttn-blog\/uploads\/2025\/06\/enterprise_application-2.png\" alt=\".\" width=\"1237\" height=\"467\" srcset=\"\/blog\/wp-ttn-blog\/uploads\/2025\/06\/enterprise_application-2.png 1237w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/enterprise_application-2-300x113.png 300w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/enterprise_application-2-1024x387.png 1024w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/enterprise_application-2-768x290.png 768w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/enterprise_application-2-624x236.png 624w\" sizes=\"(max-width: 1237px) 100vw, 1237px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Create your own application and fill in the name and then select create.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-72489 size-full\" src=\"https:\/\/www.tothenew.com\/blog\/wp-ttn-blog\/uploads\/2025\/06\/galary.png\" alt=\".\" width=\"1916\" height=\"1033\" srcset=\"\/blog\/wp-ttn-blog\/uploads\/2025\/06\/galary.png 1916w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/galary-300x162.png 300w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/galary-1024x552.png 1024w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/galary-768x414.png 768w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/galary-1536x828.png 1536w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/galary-624x336.png 624w\" sizes=\"(max-width: 1916px) 100vw, 1916px\" \/><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul style=\"list-style-type: circle;\">\n<li>Link Sonarqube with Azure Entra ID<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Navigate to Single sign-on and select SAML.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-72491 aligncenter\" src=\"https:\/\/www.tothenew.com\/blog\/wp-ttn-blog\/uploads\/2025\/06\/test.png\" alt=\".\" width=\"1015\" height=\"758\" srcset=\"\/blog\/wp-ttn-blog\/uploads\/2025\/06\/test.png 1015w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/test-300x224.png 300w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/test-768x574.png 768w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/test-624x466.png 624w\" sizes=\"(max-width: 1015px) 100vw, 1015px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Edit the Basic SAML Configuration and fill the details like :<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul style=\"list-style-type: circle;\">\n<li>Fill in the Identifier (Entity ID)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li style=\"list-style-type: none;\">\n<ol style=\"list-style-type: lower-roman;\">\n<li>The Identifier has to be the same as the Application ID in SonarQube.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul style=\"list-style-type: circle;\">\n<li>Fill in the Reply URL (Assertion Consumer Service URL)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li style=\"list-style-type: none;\">\n<ol style=\"list-style-type: lower-roman;\">\n<li>The Reply URL must have the format <strong><span style=\"color: #008000;\">&lt;Your SonarQube URL&gt;\/oauth2\/callback\/saml.<\/span><\/strong><\/li>\n<li>The Reply URL uses the Server base URL provided in SonarQube under Administration &gt; General.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-72493 size-full\" src=\"https:\/\/www.tothenew.com\/blog\/wp-ttn-blog\/uploads\/2025\/06\/signin.png\" alt=\".\" width=\"1170\" height=\"478\" srcset=\"\/blog\/wp-ttn-blog\/uploads\/2025\/06\/signin.png 1170w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/signin-300x123.png 300w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/signin-1024x418.png 1024w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/signin-768x314.png 768w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/signin-624x255.png 624w\" sizes=\"(max-width: 1170px) 100vw, 1170px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Attributes and Claims<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li style=\"list-style-type: none;\">\n<ol style=\"list-style-type: lower-roman;\">\n<li>In the Azure Entra ID SAML configuration, edit Attributes &amp; Claims to view, edit or add attributes.<\/li>\n<li>SonarQube expects the following user attributes during SAML authentication:<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Login (Required): <\/strong>In Azure Entra ID, the default attribute used is givenname.<\/li>\n<li><strong>Name (Required):<\/strong> In Azure Entra ID, the default attribute used is name.<\/li>\n<li><strong>Email (Optional)<\/strong><\/li>\n<li><strong>Group (Optional):<\/strong> Group names passed from Azure Entra ID must exactly match group names in SonarQube. If no match is found, the user is automatically assigned to the default sonar-users group.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-72494 size-full\" src=\"https:\/\/www.tothenew.com\/blog\/wp-ttn-blog\/uploads\/2025\/06\/attribute.png\" alt=\".\" width=\"1270\" height=\"583\" srcset=\"\/blog\/wp-ttn-blog\/uploads\/2025\/06\/attribute.png 1270w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/attribute-300x138.png 300w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/attribute-1024x470.png 1024w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/attribute-768x353.png 768w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/attribute-624x286.png 624w\" sizes=\"(max-width: 1270px) 100vw, 1270px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>SAML Certificates<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li style=\"list-style-type: none;\">\n<ol style=\"list-style-type: lower-roman;\">\n<li>Navigate to SAML Certificates and download Certificate (Base64).<\/li>\n<li>The certificate should be copied into the Identity provider certificate field in the SonarQube SAML configuration.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-72495 size-full\" src=\"https:\/\/www.tothenew.com\/blog\/wp-ttn-blog\/uploads\/2025\/06\/asaml.png\" alt=\".\" width=\"1321\" height=\"749\" srcset=\"\/blog\/wp-ttn-blog\/uploads\/2025\/06\/asaml.png 1321w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/asaml-300x170.png 300w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/asaml-1024x581.png 1024w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/asaml-768x435.png 768w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/asaml-624x354.png 624w\" sizes=\"(max-width: 1321px) 100vw, 1321px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Setup Sonarqube Test<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li style=\"list-style-type: none;\">\n<ol style=\"list-style-type: lower-roman;\">\n<li>You&#8217;ll need to configure the application to link with Microsoft Entra ID.<\/li>\n<li>So copy the Login URL and Microsoft Entra Identifier values which will be used in Sonarqube configuration.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-72496 size-full\" src=\"https:\/\/www.tothenew.com\/blog\/wp-ttn-blog\/uploads\/2025\/06\/asetup.png\" alt=\".\" width=\"1046\" height=\"195\" srcset=\"\/blog\/wp-ttn-blog\/uploads\/2025\/06\/asetup.png 1046w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/asetup-300x56.png 300w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/asetup-1024x191.png 1024w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/asetup-768x143.png 768w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/asetup-624x116.png 624w\" sizes=\"(max-width: 1046px) 100vw, 1046px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2>Configure SonarQube for SAML<\/h2>\n<p>&nbsp;<\/p>\n<ol>\n<li><strong>Enable SAML in SonarQube<\/strong><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul style=\"list-style-type: circle;\">\n<li>SonarQube stores SAML settings in the following locations i.e <span style=\"color: #008000;\"><strong>Administration &gt; Authentication &gt; SAML<\/strong><\/span>.<\/li>\n<li>Go to the SAML file and make sure to add the following configuration:<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Application ID : Application ID should be the same as the Identifier or application name in Azure Entra ID.<\/li>\n<li>Provider ID : Provider ID should be the same as the Microsoft Entra Identifier in the Setup SonarQube Test section\u00a0 in the Azure Entra ID.<\/li>\n<li>SAML login url : SAML login url should be the same as the Login Url in the Setup SonarQube Test section\u00a0 in the Azure Entra ID.<\/li>\n<li>Identity provider certificate : Upload the base 64 certificate here which we downloaded from the Entra ID SAML certificate section in our previous section.<\/li>\n<li>SAML user login attribute :<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-72505\" src=\"https:\/\/www.tothenew.com\/blog\/wp-ttn-blog\/uploads\/2025\/06\/aaa.png\" alt=\".\" width=\"1489\" height=\"977\" srcset=\"\/blog\/wp-ttn-blog\/uploads\/2025\/06\/aaa.png 1489w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/aaa-300x197.png 300w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/aaa-1024x672.png 1024w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/aaa-768x504.png 768w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/aaa-624x409.png 624w\" sizes=\"(max-width: 1489px) 100vw, 1489px\" \/><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul style=\"list-style-type: circle;\">\n<li>SonarQube uses the following attributes:<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>SAML user login attribute (required) :<\/strong> \u00a0A unique name to identify the user in SonarQube. The default\u00a0 Azure Entra ID attribute <strong><span style=\"color: #008000;\">name<\/span><\/strong> used in this field.<\/li>\n<li><strong>SAML user name attribute (required) :<\/strong> The full name of the user. The default\u00a0 Azure Entra ID attribute <strong><span style=\"color: #008000;\">givenname<\/span><\/strong> is used in this field.<\/li>\n<li><strong>Email (optional) :<\/strong> The email of the user.<\/li>\n<li><strong>Group (optional) :<\/strong> Supports mapping to group names in SonarQube. Group name passed by Azure Entra ID and the group name in SonarQube should match. Otherwise, the default sonar-users group is assigned.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-72506\" src=\"https:\/\/www.tothenew.com\/blog\/wp-ttn-blog\/uploads\/2025\/06\/a.png\" alt=\".\" width=\"1291\" height=\"823\" srcset=\"\/blog\/wp-ttn-blog\/uploads\/2025\/06\/a.png 1291w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/a-300x191.png 300w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/a-1024x653.png 1024w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/a-768x490.png 768w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/a-624x398.png 624w\" sizes=\"(max-width: 1291px) 100vw, 1291px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2>Enabling and testing SAML authentication<\/h2>\n<p>&nbsp;<\/p>\n<p><strong>Step 1: In the SonarQube SAML settings, enable SAML.<\/strong><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Enable the SonarQube and Test the configuration in SonarQube server.<\/li>\n<li>You will receive the required information if all configurations are correctly set.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-72507\" src=\"https:\/\/www.tothenew.com\/blog\/wp-ttn-blog\/uploads\/2025\/06\/aaaaa.png\" alt=\".\" width=\"1098\" height=\"109\" srcset=\"\/blog\/wp-ttn-blog\/uploads\/2025\/06\/aaaaa.png 1098w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/aaaaa-300x30.png 300w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/aaaaa-1024x102.png 1024w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/aaaaa-768x76.png 768w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/aaaaa-624x62.png 624w\" sizes=\"(max-width: 1098px) 100vw, 1098px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Step 2: In the login form, the new button Log in with SAMLallows users to connect with their SAML account.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-72508\" src=\"https:\/\/www.tothenew.com\/blog\/wp-ttn-blog\/uploads\/2025\/06\/aaaabbb.png\" alt=\".\" width=\"389\" height=\"214\" srcset=\"\/blog\/wp-ttn-blog\/uploads\/2025\/06\/aaaabbb.png 389w, \/blog\/wp-ttn-blog\/uploads\/2025\/06\/aaaabbb-300x165.png 300w\" sizes=\"(max-width: 389px) 100vw, 389px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h1><\/h1>\n<h1>Conclusion<\/h1>\n<p>&nbsp;<\/p>\n<p>Integrating SonarQube with Azure Active Directory using SAML provides a secure and centralized authentication mechanism for your development and DevOps teams. With this setup, user access is streamlined through single sign-on (SSO), enabling better control, enhanced security, and simplified user management through Azure Entra ID.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction This article will help you through setting up SAML-based SSO between SonarQube and Azure Entra ID. You may simplify access control for your SonarQube instance, increase security, and expedite user authentication by turning on SSO. Additionally, it guarantees centralised identity control and lowers the overhead associated with maintaining local SonarQube accounts. This integration will [&hellip;]<\/p>\n","protected":false},"author":1747,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"iawp_total_views":152},"categories":[2348],"tags":[2333,1221,2895,4057],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/posts\/72497"}],"collection":[{"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/users\/1747"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/comments?post=72497"}],"version-history":[{"count":20,"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/posts\/72497\/revisions"}],"predecessor-version":[{"id":72585,"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/posts\/72497\/revisions\/72585"}],"wp:attachment":[{"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/media?parent=72497"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/categories?post=72497"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tothenew.com\/blog\/wp-json\/wp\/v2\/tags?post=72497"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}