Configuring Kentik for SSO

Single Sign-on Enhances User Security and Convenience

As a user of network-connected services you're probably familiar with the dilemma: security threats grow more ominous, so security procedures grow more onerous, creating an increasing drag on productivity. To help make it more convenient to maintain security without constantly entering authentication credentials, Kentik has enabled single sign-on (SSO) for the Kentik Detect portal. That means Kentik users are now able access the portal via the same authentication services they use for other SSO-enabled applications, allowing them to access many services with just one sign-on.

Kentik's new SSO implementation is (exclusively) compliant with standard SAML2 transport, which is sometimes referred to as “Federated Identity Management.” In the SAML2 terminology:

Kentik's SSO implementation has been successfully tested with the following identity providers:

In the rest of this post we'll look at how SSO works, how to configure it for your Kentik account (which requires a “Super Admin” user), and how your users will sign on once you've enabled SSO.

How SSO works

SSO is conceptually quite simple. Each Kentik customer (organization) sets up an identity provider that keeps track of who in the company has permission to access Kentik Detect. (These Kentik users may be categorized into groups to facilitate differentiated management by role.) As shown in the following diagram, when a user attempts to log into the portal via the SSO login URL, Kentik finds the IdP in the company's Kentik Detect SSO settings and contacts the IdP to request verification of the user. If the IdP is able to authenticate the user, a SAML2 response is returned to Kentik and Kentik logs the user in. If the IdP can't authenticate, the user is unable to access the portal via SSO.

SSO Configuration Prerequisites

Two prerequisites must be met before you can successfully configure your Kentik account for SSO:

About Super Admin Users

Super Admin users are equivalent to Admin users, with the following additional privileges:

To prevent a single point of failure, we recommend that you set up two Super Admins so that when one is unavailable you can still reach the other. We don't recommend more than two, however, because it's wise to restrict the number of users that are allowed to log in using the traditional username/password approach.

Any Admin-level user in a given organization can check who the Super Admin users are by looking at the Level column in the User List (Admin » Users). If no user is a Super Admin, please contact Kentik support to request that a Super Admin be designated for your organization.

Note: If your organization signed up with Kentik prior to October 2017, the first user registered to your account will be automatically set as a Super Admin (to change, go to Admin » Users).

Kentik SSO Configuration

Now let's assume that you are a Super Admin ready to dig into SSO configuration. When you click Admin from the portal navbar, the Security section of the sidebar at left will include a link to the Single Sign-on page. All of the configuration steps below are performed either on that page or in your identity provider's management app.

The settings on the page are divided into two main sections: a set of switches at top and a set of fields below. Before configuration, check that the SSO Enabled switch at top is set to Off (default), so that you can complete the settings before actually turning on SSO.

Add Kentik To Your IdP

SSO involves two-way communication between Kentik and the identity provider, which requires that each is aware of the other. The information you'll need to configure your IdP to recognize Kentik Detect as a service provider (SP) is found in the first two fields:

Note that some IdP solutions, including Shibboleth, can take the above information from an XML configuration file. We've provided a ready-made config file for that purpose, which you can download directly from the Single Sign-on page via the Download Kentik SP Metadata button at the bottom.

Configure IdP Settings in Kentik

Once you've added Kentik to your IdP, go back to the Single Sign-on page to set IdP-related settings with the following controls:

Configure User-level Behavior

At this point you may also want to set the optional User Level Attrib. Key, which is a field to enter your IdP's user-level attribute key. If the IdP's response to an authentication request includes an IdP-specified user level, this setting tells Kentik where to find it. That allows user levels to be managed from the IdP:

The fact that all values other than 0 (Member) and 1 (Admin) are ignored prevents an existing user level in Kentik from being overwritten with an invalid level from the IdP. It also means (because there is no valid value representing the Super Admin level) that a user's level can't be changed to Super Admin via IdP (this is intentional to discourage the automatic creation of excessive Super Admin users).

Keep the following in mind when considering how to manage user levels with your IdP:

Configure Auto-provisioning

The Auto-provisioning switch (default = Off) determines what happens when sign-on is attempted by someone who is successfully authenticated by the IdP but is not already registered with Kentik as a user (they don't currently exist in Admin » User):

If you decide to use auto-provisioning, you're most likely to achieve the expected results by taking into account the following:

Fine-tune the Configuration

In addition to the settings above you'll also find some additional settings to tailor the configuration to your organization's specific needs:

SSO Liftoff

Once you've got all of your settings defined you're ready to set the SSO Enabled switch to On. If needed you can turn SSO off at any time without losing any of the settings you've made.

SSO Login Process

Once SSO is enabled, logins will take place at a newly created URL that is specific to your organization. In the following example, company_shortname is a placeholder for the actual value, which is the last segment of the URL shown in the SP Entity Id or SP ACS Url field (see Add Kentik To Your IdP):

When users land on your Kentik SSO login gateway page:

Migrating to SSO

The easiest way to transition from plain authentication to SSO is to leverage the SSO Required configuration switch and proceed in three steps:

  1. Configure SSO with SSO Required set to Off (default). Perform all of the needed tests and validate the optional features with a single user, typically the staff member (a Super Admin) in charge of SSO.
  2. Send an announcement to your organization's Kentik user base. Include the following:
    – A clear date on which Kentik access will be only via SSO.
    – Contact info for the Super Admin, so that users can ask for help before the cutoff date.
    – The new login URL for Kentik access via SSO (replace the company_shortname placeholder with the last segment of the URL shown in the SP Entity Id or SP ACS Url field):
  3. On the cutoff date, flip the SSO Required switch to On, after which Kentik users will only be able to log in using the SSO URL.
    Note: Once SSO is required, users attempting non-SSO access ( will be denied access.


With the addition of SSO, Kentik has make it significantly easier to use Kentik Detect securely without the hassle of separate authentication. If you're already a Kentik customer, ask your Kentik support team ( to help get you started. If you're not already a customer, find out what you're missing by signing up today for a free trial or contacting us to request a demo.