Checkstack provides flexible authentication options for both small teams and enterprise environments.
Standard email/password authentication with:
Single sign-on using GitHub accounts. Users authenticate through GitHub and are automatically created in Checkstack on first login.
Checkstack supports SAML 2.0 Service Provider (SP) initiated SSO, enabling integration with enterprise identity providers:
Navigate to Settings → Authentication → Strategies and configure the SAML strategy:
| Field | Description |
|---|---|
IdP Metadata URL |
URL to your IdP’s SAML metadata (recommended) |
IdP SSO URL |
Single Sign-On URL (if not using metadata) |
IdP Certificate |
X.509 certificate for signature validation |
SP Entity ID |
Unique identifier for Checkstack (default: checkstack) |
Attribute Mapping |
Map SAML claims to user fields (email, name) |
Checkstack supports LDAP and Active Directory authentication:
| Field | Description |
|---|---|
Server URL |
LDAP server URL (e.g., ldaps://ldap.example.com:636) |
Bind DN |
Service account for searching users |
Bind Password |
Service account password |
Base DN |
Search base (e.g., ou=users,dc=example,dc=com) |
Search Filter |
User search filter (e.g., (uid={0}) or (sAMAccountName={0})) |
Both SAML and LDAP strategies support automatic role assignment based on directory group memberships.
Enable group mapping in the strategy configuration:
Group Mapping:
├── Enabled: true
├── Group Attribute: memberOf (LDAP) or http://schemas.xmlsoap.org/claims/Group (SAML)
├── Mappings:
│ ├── Directory Group: CN=Developers,OU=Groups,DC=example,DC=com
│ │ Checkstack Role: developers
│ ├── Directory Group: CN=Admins,OU=Groups,DC=example,DC=com
│ │ Checkstack Role: admin
└── Default Role: users (optional, assigned to all users from this directory)
Checkstack uses a managed role sync pattern that distinguishes between directory-controlled roles and manually-assigned roles:
Managed Roles (roles configured in mappings):
Unmanaged Roles (roles not in any mapping):
Example Scenario:
developers rolereporting-viewer role in Checkstackdevelopers role is removed, reporting-viewer role is preservedIf a mapping contains a role ID that no longer exists in Checkstack:
For machine-to-machine access, create External Applications in Settings → Authentication → Applications:
ck_<appId>_<secret>)See External Applications for more details.