you can find information on Supported authentication methods for Synthetic Monitoring here. If you have tried using the 'HTTP Authentication' option and it hasn't worked, you can try using a private windows location with the Dynatrace Synthetic Service logged on as the user required. The downside to this method is that you will need to update the user the service is logged on as every time you update the ActiveGate, as this is a workaround rather than supported functionality.
@HannahM: Do you know if there are any enhancements planned or already available regarding this topic?
We made very promising tests with the CyberArc integration and were capable to update a newly created password in CyberArc into the Dynatrace vault.
Our approach would be, that every day/hour CyberArc is generating a new password and is synchronizing this into Dynatrace vault and our Azure AD.
But in the synthetic session we must use the username from the vault and must inject the SAML request.
By manually adding the &email@example.com and ForceAuthn="true" attributes in the SAML request we could successful reach the Azure ADP form. This would allow as to insert the username and password from the Dynatrace vault.
We are looking for a solution, that allows us to add the &login_hint="username from the Dynatrace vault" and ForceAuthn="true" to the request which is initiated in a synthetic monitor (e.g., by clicking on the "Login with SSO" button on a website).
I'm looking forward for your response as this is a crucial topic in our company regarding the rollout of Dynatrace's browser synthetic monitoring.