<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to use SAML Federation to set up Single Sign On (SSO) in Dynatrace in Dynatrace tips</title>
    <link>https://community.dynatrace.com/t5/Dynatrace-tips/How-to-use-SAML-Federation-to-set-up-Single-Sign-On-SSO-in/m-p/247024#M1271</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/47711"&gt;@MattW&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Great post. Thanks.&lt;/P&gt;&lt;P&gt;A question:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.dynatrace.com/docs/shortlink/manage-users-groups-with-saml#create-fallback" target="_self"&gt;The first step of the documentation&lt;/A&gt; is creating a fallback user account&lt;/P&gt;&lt;P&gt;My question is: this fallback user account, could it be a user account that belongs to the same organization but is created in a different branch of the Azure SAML that is going to be integrated?&lt;/P&gt;&lt;P&gt;Let me know if my question is not clear.&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;BR /&gt;Regards,&lt;BR /&gt;Elena.&lt;/P&gt;</description>
    <pubDate>Fri, 31 May 2024 10:59:45 GMT</pubDate>
    <dc:creator>erh_inetum</dc:creator>
    <dc:date>2024-05-31T10:59:45Z</dc:date>
    <item>
      <title>How to use SAML Federation to set up Single Sign On (SSO) in Dynatrace</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-tips/How-to-use-SAML-Federation-to-set-up-Single-Sign-On-SSO-in/m-p/245072#M1233</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;H2&gt;Intro&lt;/H2&gt;
&lt;/DIV&gt;
&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;FONT size="3"&gt;One of the most critical strategies for user management in a modern organization is Single Sign On (SSO); the ability to use a single set of credentials to securely access many different applications and platforms. On-premise SSO solutions, such as Microsoft's Active Directory, can use LDAP (Lightweight Directory Access Protocol) to provide this type of access in your internal network, but what about cloud-based applications that are accessed over the public internet?&lt;BR /&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;FONT size="3"&gt;Remote, cloud-based applications can be integrated into an SSO solution using the concept of Federated Identity Management (FIM), which leverages SAML (Security Assertion Markup Language) to securely pass identity information between an Identity Provider (IdP) and a Service Provider (SP) that have been Federated (they trust each other).&lt;BR /&gt;&lt;BR /&gt;&lt;/FONT&gt;While the actual functionality of SAML is beyond the scope of this article, we'll be focusing on the different types of Federation that Dynatrace offers for SSO, and specifically, how to use our Account Management portal to successfully configure each one.&lt;/P&gt;
&lt;H2&gt;&lt;BR /&gt;Federation Types&lt;/H2&gt;
&lt;P&gt;In early 2024, Dynatrace rolled out Flexible Identity Federation for SaaS, an expansion of our standard SAML configuration to provide more SSO options for customers with varied use cases and requirements.&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;A href="https://www.dynatrace.com/news/blog/unlock-seamless-access-the-power-of-flexible-identity-federation/" target="_blank" rel="noopener noreferrer"&gt;https://www.dynatrace.com/news/blog/unlock-seamless-access-the-power-of-flexible-identity-federation...&lt;/A&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;When adding a SAML configuration for an SSO domain, one of three selectable federations will now determine when and how SSO should apply for users with that domain name when logging into Dynatrace.&lt;BR /&gt;&lt;FONT size="4"&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;Global&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- applies to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;ALL&lt;/STRONG&gt;&lt;/EM&gt;&amp;nbsp;SSO domain users for&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;ANY&lt;/STRONG&gt;&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Dynatrace account (previously the only federation available)&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;Account-specific&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- applies to SSO domain users for&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;ALL&lt;/EM&gt;&lt;/STRONG&gt;&amp;nbsp;environments of a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;SINGLE&lt;/STRONG&gt;&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;account&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;Environment-specific&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- applies to SSO domain users for&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;I&gt;SELECTED&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/I&gt;&lt;/STRONG&gt;environments&amp;nbsp;within a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;SINGLE&lt;/STRONG&gt;&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;account&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;A&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;more detailed breakdown of these Federation types can be found in our documentation here:&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;A href="https://docs.dynatrace.com/docs/manage/access-control/user-management-and-sso/manage-users-and-groups-with-saml/federation-concepts" target="_blank" rel="noopener noreferrer"&gt;https://docs.dynatrace.com/docs/manage/access-control/user-management-and-sso/manage-users-and-group...&lt;/A&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;H2&gt;&lt;BR /&gt;How to Add a SAML configuration in Dynatrace&lt;/H2&gt;
&lt;P&gt;In this article, we'll be walking you through how to add a SAML configuration for each of the following:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Global Federation&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Account Federation&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Environment Federation&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Feel free to scroll down to the section of the specific federation you want to set up for step-by-step instructions on how to configure it.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="5"&gt;&lt;STRONG&gt;&lt;SPAN&gt;Global Federation&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Unlike Account federation, Global federation requires that a domain first be verified before a SAML configuration can be added.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="3"&gt;&lt;SPAN&gt;To get started, click&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Identity &amp;amp; access management&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;and then&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Domain verification&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;H2&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MattW_50-1713392274356.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19142i0266D92EC5F68A50/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MattW_50-1713392274356.png" alt="MattW_50-1713392274356.png" /&gt;&lt;/span&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;Enter the domain you want to use for SSO and click&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Add&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MattW_51-1713392274357.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19141i044B31431CB2416B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MattW_51-1713392274357.png" alt="MattW_51-1713392274357.png" /&gt;&lt;/span&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;In the next screen, you'll be provided with the value of a TXT record you'll need to add to the DNS record of the domain you're attempting to verify. Click&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;(1) Copy value&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;and add the site verification string as the data in the TXT record for the domain and then once you have confirmed this record has propagated, click the 3 dots followed by&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;(2) Verify&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="domain verification3.png" style="width: 999px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19707iECC2065FB9CD53B7/image-size/large?v=v2&amp;amp;px=999" role="button" title="domain verification3.png" alt="domain verification3.png" /&gt;&lt;/span&gt;
&lt;P&gt;&lt;FONT size="3"&gt;&lt;SPAN&gt;Once successful, you will see your domain listed under&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Verified domains&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;H2&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MattW_52-1713392274358.png" style="width: 999px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19140iC9B7C4CAC925D8EC/image-size/large?v=v2&amp;amp;px=999" role="button" title="MattW_52-1713392274358.png" alt="MattW_52-1713392274358.png" /&gt;&lt;/span&gt;&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;This domain can now be used for our &lt;STRONG&gt;Global&lt;/STRONG&gt; federation.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;To get started, click&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Identity &amp;amp; access management&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;followed by&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;SAML configuration&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MattW_53-1713392274358.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19145iB5834DFCCEB694FE/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MattW_53-1713392274358.png" alt="MattW_53-1713392274358.png" /&gt;&lt;/span&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Click the&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;New configuration&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;button&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SAML config 2.png" style="width: 999px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19708i3A84479D12D1A85E/image-size/large?v=v2&amp;amp;px=999" role="button" title="SAML config 2.png" alt="SAML config 2.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Select&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Global federation&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;as federation type&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MattW_55-1713392274359.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19144i1749B576017D17CD/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MattW_55-1713392274359.png" alt="MattW_55-1713392274359.png" /&gt;&lt;/span&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In the next screen, select the domain that you verified and then click&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Download XML&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;to get the SP metadata which will be used to configure SSO at your specific IdP.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MattW_56-1713392274360.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19147i6E64ADE49D7D6D16/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MattW_56-1713392274360.png" alt="MattW_56-1713392274360.png" /&gt;&lt;/span&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Once this has been done, obtain the resulting IdP metadata from your IdP, return to the SAML configuration page in Dynatrace, and add the metadata either by uploading an XML with&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Choose file&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;or by copying and pasting the metadata contents into the&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;&amp;nbsp;Identity provider SAML metadata&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;textbox.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MattW_57-1713392274362.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19148iED855621173876ED/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MattW_57-1713392274362.png" alt="MattW_57-1713392274362.png" /&gt;&lt;/span&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Scroll down to the Attribute mapping section and add the &lt;STRONG&gt;Firstname&lt;/STRONG&gt;, &lt;STRONG&gt;Lastname&lt;/STRONG&gt;, and &lt;STRONG&gt;Federated&lt;/STRONG&gt; attributes based on the settings of your specific IdP&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MattW_58-1713392274363.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19146i05EA141963FC8A52/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MattW_58-1713392274363.png" alt="MattW_58-1713392274363.png" /&gt;&lt;/span&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Click&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Next&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;to validate your SAML configuration. This validation will attempt to use the settings you have entered by sending a login request to your IdP based on the user you are currently logged into Dynatrace with. Depending on your IdP, you may notice that you are redirected to your SSO login page, in which case you will want to enter your credentials as you normally would.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Once the request has finished, you will receive a&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;SAML configuration validation complete&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;message and you can close your current browser tab to view the results of the validation.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H2&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MattW_59-1713392274364.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19149i65D40BC19EB93B48/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MattW_59-1713392274364.png" alt="MattW_59-1713392274364.png" /&gt;&lt;/span&gt;&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If successful, the results should contain the login username, first name, last name, and group(s) that your current user belongs to:&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Account Fed 4.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19155i382FC88E15904573/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Account Fed 4.png" alt="Account Fed 4.png" /&gt;&lt;/span&gt;
&lt;P&gt; &lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The results may also contain warnings, which you can choose to ignore and move on, or errors that will prevent the configuration from being saved and need to be corrected.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Once the SAML configuration has been validated&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;I&gt;&lt;SPAN&gt;and you are ready to start using SSO&lt;/SPAN&gt;&lt;/I&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, ensure that&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Enable SSO&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;is switched on and click the&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Complete configuration&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;button to save your SAML configuration.&lt;/SPAN&gt;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Account Fed 6.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19157i40EC494C31961CC4/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Account Fed 6.png" alt="Account Fed 6.png" /&gt;&lt;/span&gt;
&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;PLEASE NOTE:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;SPAN&gt;&lt;BR /&gt;If you are not yet ready to fully implement SSO or have not yet&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://docs.dynatrace.com/docs/manage/access-control/user-management-and-sso/manage-users-and-groups-with-saml#create-fallback" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;created your fallback account&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;,&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;DO NOT&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;enable SSO.&lt;BR /&gt;You will still be able to save the configuration and can enable it at any time by editing the SAML configuration.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Account Federation&lt;/H2&gt;
&lt;P&gt;To start, log into&amp;nbsp;&lt;A href="https://myaccount.dynatrace.com,/" target="_blank" rel="noopener noreferrer"&gt;https://myaccount.dynatrace.com&lt;/A&gt;&amp;nbsp;and click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Identity &amp;amp; access management&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;followed by&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;SAML configuration&lt;/STRONG&gt;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MattW_0-1713392066484.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19120i70D7C75729DC2C93/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MattW_0-1713392066484.png" alt="MattW_0-1713392066484.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Click the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;New configuration&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;button&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SAML config 2.png" style="width: 999px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19705i2FB07D31D057819A/image-size/large?v=v2&amp;amp;px=999" role="button" title="SAML config 2.png" alt="SAML config 2.png" /&gt;&lt;/span&gt;
&lt;P&gt; &lt;/P&gt;
&lt;P&gt;Select&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Account federation&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;as federation type&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MattW_2-1713392066359.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19121i565B9DA2286B01D7/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MattW_2-1713392066359.png" alt="MattW_2-1713392066359.png" /&gt;&lt;/span&gt;
&lt;P&gt; &lt;/P&gt;
&lt;P&gt;In the next screen, provide a name for your configuration and click the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Generate SP metadata&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;button&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MattW_3-1713392066356.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19123i4BAEC27F118A6AC7/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MattW_3-1713392066356.png" alt="MattW_3-1713392066356.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note that the button changes to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Download SP metadata&lt;/STRONG&gt;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MattW_4-1713392066422.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19122i3E7437DE41C3523D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MattW_4-1713392066422.png" alt="MattW_4-1713392066422.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Click this button again to get an XML file of the SP metadata which will be used to configure SSO at your specific IdP.&lt;/P&gt;
&lt;P&gt;Once this has been done, obtain the resulting IdP metadata from your IdP, return to the SAML configuration page in Dynatrace, and add the metadata either by uploading an XML with&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Choose file&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;or copying and pasting the metadata contents into the&lt;STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Identity provider SAML metadata&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;textbox.&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MattW_5-1713392066370.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19124i005BD8934C8185C6/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MattW_5-1713392066370.png" alt="MattW_5-1713392066370.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
Scroll down to the Attribute mapping section and add the &lt;STRONG&gt;Firstname&lt;/STRONG&gt;, &lt;STRONG&gt;Lastname&lt;/STRONG&gt;, and &lt;STRONG&gt;Federated&lt;/STRONG&gt; attributes based on the settings of your specific IdP&lt;/DIV&gt;
&lt;DIV class="lia-message-template-content-zone"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MattW_6-1713392066443.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19126i079774000EAC6298/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MattW_6-1713392066443.png" alt="MattW_6-1713392066443.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Next&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to validate your SAML configuration. This validation will attempt to use the settings you have entered by sending a login request to your IdP based on the user you are currently logged into Dynatrace with. Depending on your IdP, you may notice that you are redirected to your SSO login page, in which case you will want to enter your credentials as you normally would.&lt;BR /&gt;&lt;BR /&gt;Once the request has finished, you will receive a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;SAML configuration validation complete&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;message and you can close your current browser tab to view the results of the validation.&lt;/DIV&gt;
&lt;DIV class="lia-message-template-content-zone"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MattW_7-1713392066291.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19125i2B3DE8E7C2E42662/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MattW_7-1713392066291.png" alt="MattW_7-1713392066291.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If successful, the results should contain the login username, first name, last name, and group(s) that your current user belongs to:&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MattW_8-1713392066451.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19127iC6C2AFF5E9ED0F97/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MattW_8-1713392066451.png" alt="MattW_8-1713392066451.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;SPAN&gt;The results may also contain warnings, which you can choose to ignore and move on, or errors that will prevent the configuration from being saved and need to be corrected.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;However, as long as everything looks correct, you can click next and proceed to the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Scope assignment&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;section.&lt;BR /&gt;&lt;BR /&gt;&lt;/DIV&gt;
&lt;DIV class="lia-message-template-content-zone"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MattW_9-1713392066413.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19128i70ADFAAA37DBE785/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MattW_9-1713392066413.png" alt="MattW_9-1713392066413.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;STRONG&gt;Account&lt;/STRONG&gt; federation allows you to select one of two different domain &lt;STRONG&gt;scopes&lt;/STRONG&gt;, which will further determine how SSO will function&lt;/DIV&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Option&amp;nbsp;A&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;allows you to&amp;nbsp;select one or more&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://docs.dynatrace.com/docs/manage/access-control/user-management-and-sso/manage-users-and-groups-with-saml#verify-ownership" target="_self" rel="noopener noreferrer"&gt;&lt;STRONG&gt;verified domains&lt;/STRONG&gt;&lt;/A&gt;. This will allow you to set up a standard SSO integration for the selected domain that will be limited to only &lt;EM&gt;your&lt;/EM&gt; Dynatrace account. This is useful for large organizations that share the same domain name, but have separate SSO implementations and Dynatrace accounts. Previously, this functionality was referred to as "non-global federation".&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Option B&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;allows you to authenticate users with domains that have not been verified in Dynatrace, but exist as users in your IdP. In other words, users belonging to partner organizations or other domains you do not have direct control over that are still part of your SSO and need to access Dynatrace.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Once the scope selection has been made&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;and you are ready to start using SSO&lt;/EM&gt;&lt;/STRONG&gt;, ensure that&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Enable SSO&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is switched on and click the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Complete configuration&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;button to save your SAML configuration&lt;/P&gt;
&lt;DIV class="lia-message-template-content-zone"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MattW_36-1713392229338.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19129iF43C3487B9E513BC/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MattW_36-1713392229338.png" alt="MattW_36-1713392229338.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;PLEASE NOTE:&lt;BR /&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;SPAN&gt;If you are not yet ready to fully implement SSO or have not yet&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://docs.dynatrace.com/docs/manage/access-control/user-management-and-sso/manage-users-and-groups-with-saml#create-fallback" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;created your fallback account&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;,&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;DO NOT&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;enable SSO.&lt;BR /&gt;You will still be able to save the configuration and can enable it at any time by editing the SAML configuration.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="5"&gt;&lt;STRONG&gt;&lt;SPAN&gt;Environment Federation&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;To start, log into&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://myaccount.dynatrace.com,/" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;https://myaccount.dynatrace.com&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;and click&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Identity &amp;amp; access management&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;followed by&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;SAML configuration&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MattW_37-1713392229339.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19130i8FE7FEE8E38131CC/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MattW_37-1713392229339.png" alt="MattW_37-1713392229339.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Click the&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;New configuration&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;button&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SAML config 2.png" style="width: 999px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19709iB6B5C540378579E8/image-size/large?v=v2&amp;amp;px=999" role="button" title="SAML config 2.png" alt="SAML config 2.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Select&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Environment federation&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;as federation type&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MattW_39-1713392229340.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19133i3C7FCB19BF619B3E/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MattW_39-1713392229340.png" alt="MattW_39-1713392229340.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In the next screen, provide a name for your configuration and click the&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Generate SP metadata&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;button&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MattW_40-1713392229340.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19132i1FF6F22D66443378/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MattW_40-1713392229340.png" alt="MattW_40-1713392229340.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Note that the button changes to&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Download SP metadata&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MattW_41-1713392229341.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19134iAF8F41EF31B77264/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MattW_41-1713392229341.png" alt="MattW_41-1713392229341.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Click this button again to get an XML file of the SP metadata which will be used to configure SSO at your specific IdP&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Once this has been done, obtain the resulting IdP metadata from your IdP, return to the SAML configuration page in Dynatrace, and add the metadata either by uploading an XML with&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Choose file&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;or copying and pasting the metadata contents into the&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;&amp;nbsp;Identity provider SAML metadata&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;textbox&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MattW_42-1713392229341.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19137i911D16795C3CF7E4/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MattW_42-1713392229341.png" alt="MattW_42-1713392229341.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Scroll down to the Attribute mapping section and add the &lt;STRONG&gt;Firstname&lt;/STRONG&gt;, &lt;STRONG&gt;Lastname&lt;/STRONG&gt;, and &lt;STRONG&gt;Federated&lt;/STRONG&gt; attributes based on the settings of your specific IdP&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MattW_43-1713392229345.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19135iFA963941FB96AD09/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MattW_43-1713392229345.png" alt="MattW_43-1713392229345.png" /&gt;&lt;/span&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;Click&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Next&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;to validate your SAML configuration. This validation will attempt to use the settings you have entered by sending a login request to your IdP based on the user you are currently logged into Dynatrace with. Depending on your IdP, you may notice that you are redirected to your SSO login page, in which case you will want to enter your credentials as you normally would.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Once the request has finished, you will receive a&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;SAML configuration validation complete&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;message and you can close your current browser tab to view the results of the validation&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MattW_44-1713392229346.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19136iD1D289A2A00F6F11/image-size/medium?v=v2&amp;amp;px=400" role="button" title="MattW_44-1713392229346.png" alt="MattW_44-1713392229346.png" /&gt;&lt;/span&gt;
&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If successful, the results should contain the login username, first name, last name, and group(s) that your current user belongs to:&lt;/SPAN&gt;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MattW_45-1713392229347.png" style="width: 515px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19138i15E879572C78DD0A/image-dimensions/515x255?v=v2" width="515" height="255" role="button" title="MattW_45-1713392229347.png" alt="MattW_45-1713392229347.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The results may also contain warnings, which you can choose to ignore and move on, or errors that will prevent the configuration from being saved and need to be corrected.&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;However, as long as everything looks correct, you can click next and proceed to the&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Scope assignment&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;section where you will see the option to&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Add federation&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Environment Fed 4.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19151i5128AD05E9AF2BD3/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Environment Fed 4.png" alt="Environment Fed 4.png" /&gt;&lt;/span&gt;
&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;What federation is referring to here is which &lt;STRONG&gt;environment(s)&lt;/STRONG&gt; you will choose to apply SSO to. For example, you may have one production environment and one development environment that each use separate IdPs.&lt;BR /&gt;This would allow you to ensure that when a user logs into their environment, they are also routed to their respective IdP.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Environment Fed 5.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19152i03D8539DDC002D29/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Environment Fed 5.png" alt="Environment Fed 5.png" /&gt;&lt;/span&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Each &lt;STRONG&gt;Environment&lt;/STRONG&gt; federation that you add requires that you select two options:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN&gt;A&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;- The&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://docs.dynatrace.com/docs/get-started/monitoring-environment#environment-id" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;&lt;SPAN&gt;UUID&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;of the &lt;STRONG&gt;environment&lt;/STRONG&gt; you want this federation to apply to&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;SPAN&gt;B&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;- The associated&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://docs.dynatrace.com/docs/manage/access-control/user-management-and-sso/manage-users-and-groups-with-saml#verify-ownership" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;&lt;SPAN&gt;verified domain(s)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;this federation should apply to&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;As an example, it should look something similar to this:&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Environment Fed 6.png" style="width: 645px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19153iD16B8C955C1F8928/image-dimensions/645x416?v=v2" width="645" height="416" role="button" title="Environment Fed 6.png" alt="Environment Fed 6.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Once all desired federations have been added&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;I&gt;&lt;SPAN&gt;and you are ready to start using SSO&lt;/SPAN&gt;&lt;/I&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, ensure that&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Enable SSO&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;is switched on and click the&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Complete configuration&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;button to save your SAML configuration&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Account Fed 6.png" style="width: 400px;"&gt;&lt;img src="https://community.dynatrace.com/t5/image/serverpage/image-id/19154iCEF0CD6E37DAA906/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Account Fed 6.png" alt="Account Fed 6.png" /&gt;&lt;/span&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;PLEASE NOTE:&lt;BR /&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;SPAN&gt;If you are not yet ready to fully implement SSO or have not yet&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://docs.dynatrace.com/docs/manage/access-control/user-management-and-sso/manage-users-and-groups-with-saml#create-fallback" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;created your fallback account&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;,&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;DO NOT&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;enable SSO.&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;You will still be able to save the configuration and can enable it at any time by editing the SAML configuration.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;For troubleshooting steps, see the article:&amp;nbsp;&lt;A id="link_7" class="page-link lia-link-navigation lia-custom-event" href="https://community.dynatrace.com/t5/Troubleshooting/Troubleshooting-common-SAML-federation-issues-with-Dynatrace-SSO/ta-p/243825" target="_blank"&gt;Troubleshooting common SAML federation issues with Dynatrace SSO&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Mon, 13 May 2024 10:33:22 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-tips/How-to-use-SAML-Federation-to-set-up-Single-Sign-On-SSO-in/m-p/245072#M1233</guid>
      <dc:creator>MattW</dc:creator>
      <dc:date>2024-05-13T10:33:22Z</dc:date>
    </item>
    <item>
      <title>Re: How to use SAML Federation to set up Single Sign On (SSO) in Dynatrace</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-tips/How-to-use-SAML-Federation-to-set-up-Single-Sign-On-SSO-in/m-p/245109#M1234</link>
      <description>&lt;P&gt;Thank you!&amp;nbsp;&lt;img class="lia-deferred-image lia-image-emoji" src="https://community.dynatrace.com/html/@9BD876A77FEF3D5EF4BC972CF8A97CB1/images/emoticons/take_my_money.png" alt=":take_my_money:" title=":take_my_money:" /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2024 16:09:09 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-tips/How-to-use-SAML-Federation-to-set-up-Single-Sign-On-SSO-in/m-p/245109#M1234</guid>
      <dc:creator>AntonPineiro</dc:creator>
      <dc:date>2024-05-08T16:09:09Z</dc:date>
    </item>
    <item>
      <title>Re: How to use SAML Federation to set up Single Sign On (SSO) in Dynatrace</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-tips/How-to-use-SAML-Federation-to-set-up-Single-Sign-On-SSO-in/m-p/245120#M1235</link>
      <description>&lt;P&gt;great post!!!!&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2024 18:44:54 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-tips/How-to-use-SAML-Federation-to-set-up-Single-Sign-On-SSO-in/m-p/245120#M1235</guid>
      <dc:creator>DanielS</dc:creator>
      <dc:date>2024-05-08T18:44:54Z</dc:date>
    </item>
    <item>
      <title>Re: How to use SAML Federation to set up Single Sign On (SSO) in Dynatrace</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-tips/How-to-use-SAML-Federation-to-set-up-Single-Sign-On-SSO-in/m-p/247024#M1271</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/47711"&gt;@MattW&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Great post. Thanks.&lt;/P&gt;&lt;P&gt;A question:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.dynatrace.com/docs/shortlink/manage-users-groups-with-saml#create-fallback" target="_self"&gt;The first step of the documentation&lt;/A&gt; is creating a fallback user account&lt;/P&gt;&lt;P&gt;My question is: this fallback user account, could it be a user account that belongs to the same organization but is created in a different branch of the Azure SAML that is going to be integrated?&lt;/P&gt;&lt;P&gt;Let me know if my question is not clear.&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;BR /&gt;Regards,&lt;BR /&gt;Elena.&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 10:59:45 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-tips/How-to-use-SAML-Federation-to-set-up-Single-Sign-On-SSO-in/m-p/247024#M1271</guid>
      <dc:creator>erh_inetum</dc:creator>
      <dc:date>2024-05-31T10:59:45Z</dc:date>
    </item>
    <item>
      <title>Re: How to use SAML Federation to set up Single Sign On (SSO) in Dynatrace</title>
      <link>https://community.dynatrace.com/t5/Dynatrace-tips/How-to-use-SAML-Federation-to-set-up-Single-Sign-On-SSO-in/m-p/248158#M1292</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/40722"&gt;@erh_inetum&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;For the fallback user account to be effective, it should ideally be a user with admin-level permissions in Dynatrace set up with an email domain that is not connected to your SAML integration in any way.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The reason for this is that the fallback account needs to be detected as a LOCAL user in order to log into Account Management when there is a problem with SSO/SAML.&lt;BR /&gt;Although the scenario you described might work, if the domain is attached to your SAML integration somehow, you risk the chance of this account being detected as a SAML user and redirected back to your IdP, which would prevent you from bypassing SSO and allowing a login as a local user.&lt;/P&gt;&lt;P&gt;The fallback account does not have to be part of Azure or an existing IdP setup in order to work though. For example, you could create a user for your fallback account that uses a gmail address.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jun 2024 14:30:59 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Dynatrace-tips/How-to-use-SAML-Federation-to-set-up-Single-Sign-On-SSO-in/m-p/248158#M1292</guid>
      <dc:creator>MattW</dc:creator>
      <dc:date>2024-06-12T14:30:59Z</dc:date>
    </item>
  </channel>
</rss>

