Private Status Page

Private Status Pages are similar to External Status Pages, but only authorized users are allowed to access them. Private Status Pages are not available to the general public. Authorization is handled by OpenID SSO, and is independent from PagerDuty's Single Sign-On (SSO) feature.

📘

Pricing Information

PagerDuty offers two Status Page packaging options, one which includes External Status Pages, and a premium package that also features Private Status Pages. Depending on the package you choose, other features items such as Page Subscribers, Premium Account Subscribers and Total Account Subscribers may vary.

Please contact our Sales Team for more information.

Create a Private Status Page

  1. In the PagerDuty web app, navigate to Status External Status Page.
  2. ClickNew Status Page and, under Status Page Type, select Private.
A screenshot of the PagerDuty web app showing where to select the option to make a status page private

Initial setup

  1. Continue setting up the status page using the instructions from Create an External Status Page.

Configure Single Sign-On (SSO)

You will need to configure SSO on your Private Status Page before users can access it. Private Status Pages use the OpenID Connect (OIDC) protocol to allow users access.

  1. In the PagerDuty web app, navigate to Status External Status Page, select the Private tab, and click the name of the page you want to configure.
A screenshot of the PagerDuty web app where to select private status pages

Select Private tab

  1. In the left pane, select Configuration Single Sign-On tab.
    1. Note: If prompted to Update your SSO Configuration, click Continue to proceed. Otherwise, proceed to the next step.
  2. Enter the following information:
    1. Configuration URL (i.e., the URL on your OpenID server that ends with /.well-known/openid-configuration)
    2. OpenID client ID
    3. OpenID client secret
A screenshot of the PagerDuty web app showing SSO configuration details for Private Status Page

SSO configuration

  1. Click Test SSO to check your configuration. Resolve any reported errors and proceed to the next step.
    1. Note: After successfully configuring and saving your SSO settings, Test SSO may not appear in the UI the next time you visit the page.
  2. Click Save.

The instructions below detail how to integrate with common SSO providers. You're free, however, to integrate with the SSO provider of your choice:

Okta

Create the Application

  1. Go to Applications Create App Integration.
  2. For Sign-in method, select OIDC - OpenID Connect, and for Application type, select Web Application. Click Next.
A screenshot of the Okta UI showing how to create a new app integration

Create a new app integration

  1. Under Application, enter a name for the application.
A screenshot of the Okta UI showing an application's general settings

General settings

  1. Copy the Redirect URL from the SSO configuration in PagerDuty and paste it into the Sign-in redirect URI. Do the same for the Login URL and the Sign-out redirect URIs.
  2. Select how you would like to assign the application, and click Save.
  3. On the next page, copy the client ID and client secret, and paste it into the OpenID client ID and OpenID client Secret fields on the PagerDuty SSO configuration page.
A screenshot of the Okta UI showing client credentials

Client credentials

  1. Go to Security API and select the Authorization Server you want to connect.
  2. Copy the Metadata URI and paste it into the Configuration URL field in the PagerDuty SSO configuration page.
A screenshot of the Okta UI showing the application's metadata URI

Metadata URI

  1. Replace the end of the URL (oauth-authorization-server) with openid-configuration. The URL in PagerDuty must end with /.well-known/openid-configuration.
  2. Save the SSO configuration.

Profile Mapping and Custom Claims

  1. Go to Directory Profile Editor and select your application.
  2. Click Add Attribute. For the Data type, select string. Enter a Display name. For the variable name enter pd_status_pages. Select Greater than for Attribute length, with a value of 0. Select Yes for Attribute required and click Save.
A screenshot of the Okta UI showing how to add an attribute

Add attribute

  1. Click Mappings, and find pd_status_pages. Ensure that Apply mapping on user create and update is selected (i.e., it shows a green arrow). Enter the custom claim value from the PagerDuty SSO configuration page, surrounded by single quotes, and click Save Mappings.
A screenshot of the Okta UI showing how to configure custom claim values

Custom claim value

  1. Go to Security API and select the authorization server you will be using. Then select the Claims tab and click Add Claim.
  2. In the Name field, enter the name found under the Custom Claim Key on the PagerDuty SSO configuration page. Select ID Token as Always. Under Value, enter appuser.pd_status_pages.
A screenshot of the Okta UI showing how to edit a claim

Edit claim

📘

Data Requirement

The name of the claim must match the Custom Claim Key name.

Azure

Create the Application

  1. In the Microsoft Entra Admin Center, navigate to App Registrations New Registration.
  2. Enter a name for the app and the Redirect URI from the PagerDuty SSO Configuration page.
A screenshot of the Azure UI showing how to register an application

Register an application

  1. Find the newly created app under App Registrations and select it. Then, click Add a certificate or secret to create a client secret. On the next screen, click New Client Secret.
A screenshot of the Azure UI showing how to add a certificate or secret

Add a certificate or secret

  1. Copy newly created client secret and paste it into the PagerDuty SSO configuration page. Then go back to the previous page and copy and paste the Application (i.e., client) ID.
    Note: you will be presented with an array of values associated with your client secret.
    • Typically the values will include the following fields: Description, Expires, Value, Secret ID.
    • Look for the secret's Value field.
      • Note: Please do not use the data in the Secret's Secret ID field, which is UUID and not intended for the secure use.
  2. Go back to the previous screen and click Authentication. Under Front-channel logout URL, add the logout URL from the PagerDuty SSO Configuration page and Save.
A screenshot of the Azure UI showing the redirect URL

Redirect URL

  1. In the same menu where Authentication was found, select Manage Branding and Properties. In the Home page URL field, enter the login URL from the PagerDuty SSO Configuration page and click Save.
Home page URL

Home page URL

  1. Go back to the created application (as in step 3), and click on Endpoints. Locate the OpenID Connect metadata document URL and copy it and paste it into the Configuration URL on the PagerDuty SSO Configuration page.
A screenshot of the Azure UI showing where to find the OpenID Connect metadata document

OpenID Connect metadata document

Profile Mapping and Custom Claims

  1. On your app page (from app registration), select Manage App roles.
A screenshot of the Azure UI showing to find app roles

App roles

  1. Click Create Role, and enter the custom claim key and custom claim value found on the PagerDuty SSO configuration page. Click Apply.
A screenshot of the Azure UI showing how to create an app role

Create app role

  1. Under Manage, select Manifest. In the JSON representation, update acceptMappedClaims to true and save.
  2. Go to Applications Enterprise Applications, select the application, and go to Single Sign-On. Click Edit next to Attributes & Claims.
A screenshot of the Azure UI showing where to edit Attributes & Claims

Attributes and Claims

  1. Click Add New Claim. Enter the custom claim key (status_pages) for the name. Under Source, select Attribute, and under Source attribute, enter users.assignedroles. Click Save.
A screenshot of the Azure UI showing how to manage a claim

Manage claim

  1. Go to Applications Enterprise Applications, select the application, and go to Users and groups. Click Add user/group. Select the users who should have access to the private status page, then select the status_pages role. Click Assign.
A screenshot of the Azure UI showing how to assign an app role

Assign app role

Salesforce

Create the Application

  1. Ensure that the Identity Provider is enabled in Salesforce. In the Setup view go to Settings Identity Identity Provider, and click Enable Identity Provider.

    A screenshot of the Salesforce UI showing how to enable identity provider

    Enable identity provider

  2. Go to Settings Identity OAuth and OpenID Connect Settings and ensure that the Allow Authorization Code and Credentials Flows option is enabled.

    A screenshot of the Salesforce UI showing where to enable Allow Authorization Code and Credentials Flows

    Allow Authorization Code and Credentials Flows

  3. Go to Platform Tools Apps App Manager and click New Connected App.

    A screenshot of the Salesforce UI showing how to create a new connected app

    New connected app

  4. Enter basic information, then enable OAuth settings and populate the following fields, and save:

    1. Callback URL: use the redirect URL from your PagerDuty Private Page

    2. Selected OAuth Scopes: Add Access unique user identifiers (openid)

    3. Enable Authorization Code and Credentials Flow: Enable

    4. Require user credentials in the POST body for Authorization Code and Credentials Flow: Enable

    5. Require Secret for Web Server Flow: Enable (optional)

    6. Issue JSON Web Token (JWT)-based access tokens for named users: Enable

    7. Configure ID Token: Enable

    8. Include Custom Attributes: Enable

  5. After saving, click on Manage Consumer Details to get the Consumer Key and Consumer Secret.

  6. On your PagerDuty private page Single Sign-On Settings, populate the following fields and save:

    1. Configuration URL: https\://{{your-workspace-domain}}.my.salesforce.com/.well-known/openid-configuration
    2. OpenID client ID: {{Consumer Key}}
    3. OpenID client secret: {{Consumer Secret}}

Profile Mapping and Custom Claims

  1. Back in Salesforce, grant permissions to the groups that you want to be able to access the page (if users are not self-authorizing). To do this, go to Apps Connected Apps Manage Connected Apps and click on Manage Permissions under the Permission Sets field.

    A screenshot of the Salesforce UI showing how to manage permission sets

    Permission sets

  2. Finally, to add the status page ID, go back to the previous view (i.e., Manage Connected Apps) and click New next to Custom Attributes.

  3. Paste the Custom Claim Key and Custom Claim Value from the PagerDuty SSO settings, into the Attribute key and Attribute value fields.

    A screenshot of the Salesforce UI showing how to create a custom attribute

    Create custom attribute

Ping Identity

Create the Application

  1. Go to Applications, and click to add a new application.

    A screenshot of the Ping Indentity UI showing how add a new application

    Add application

  2. Enter an application name, select an application type, and click Save.

    A screenshot of the Ping Indentity UI showing how to configure application settings

    Application settings

  3. Click on the Configuration tab and the URLs dropdown.

  4. Copy the OIDC Discovery Endpoint, the Client ID, and the Client Secret, and paste these values into the PagerDuty private page Single Sign-On Settings.

    A screenshot of the Ping Indentity UI showing configuration settings
  5. Edit the configuration by clicking the pencil button in the top right corner, update the following fields, and save:

    1. Client Credentials: Enable
    2. Redirect URIs: the redirect URL from the PagerDuty Single Sign-On page
    3. Token Endpoint Authentication Method: Client Secret Post
    4. Initiate Login URI: Login URL from the PagerDuty Single Sign-On page
    5. Signoff URLs: Logout URL from the PagerDuty Single Sign-On page
    A screenshot of the Ping Indentity UI showing how to configure general settings

    General settings

  6. In the Resources tab, check that the openid scope is available.

    A screenshot of the Ping Indentity UI showing how to allow the openid scope

    Allow openid

Profile Mapping and Custom Claims

  1. Go to Directory User Attributes and click to add a new attribute.

  2. Select Declared, enter a name for the attribute and save it.

    A screenshot of the Ping Indentity UI showing how to add an attribute

    Add attribute

  3. Go to Users, edit any users you want to grant access, and click Add next to Custom Attributes. Enter the custom claim ID value found on the Single Sign-On page.

    A screenshot of the Ping Indentity UI showing how to add custom attributes

    Custom attributes

  4. Go to Applications Resources, find the openid resource that is being used, and select it.

  5. Go to the Attributes tab and click to add a new attribute.

    A screenshot of the Ping Indentity UI showing how to configure attributes

    Attributes

  6. Enter the Custom Claim Key from the Single Sign-On page and select the attribute that you created in steps 1–3.