- collaboration
- Invite Team Members
- Assign Projects
- Users & Role Management
- Review Management [Test Cases]
- Review Management [Elements]
- Execution Controls
- test cases
- Test Cases
- Test Case List Actions
- Import and Export Test Cases
- Import Test Project Test Cases
- Importing Postman Collections and Environments
- Test cases for Desktop Windows
- Update Test Case result in a Test Plan
- Test cases for Mobile Web Application
- Test Step Types
- Type: Natural Language
- Type: REST API
- Type: Step Group
- Type: For Loop
- Type: While Loop
- Type: Block
- Type: If Condition
- Nested Step Groups
- Create Test Steps
- Create Test Steps Using Simple English
- Test Step Settings
- Test Step Options
- Reuse Elements
- Test Step Reordering
- Bulk Actions
- Add Steps Before & After
- Web Applications
- Test Step Actions
- Test Step Settings
- Test Data in Steps
- Add Steps Manually
- Reuse Elements
- Update Elements
- Create an Element
- Reorder Test Steps
- Bulk Actions
- Add Steps Before & After
- Record steps anywhere in a Test Case
- Image Injection
- Cross-application testing
- Test Data Types
- Raw
- Parameter
- Runtime
- Random
- Data Generator
- Phone Number
- Mail Box
- Environment
- Concat Test Data
- Create Test Data [Parameter]
- Update Test Data Profile
- Updating Value in TDP
- Import TDP
- Bulk Deletion of a Test Data Profile
- Create Test Data [Environment]
- Elements (Objects)
- Web Applications
- Record Multiple Elements
- Record Single Element
- Create Elements
- Supported Locator Types
- Formulating Elements
- Shadow DOM Elements
- Verifying elements in Chrome DevTools
- Handling iframe Elements?
- Dynamic Locators using Parameter
- Dynamic Locators using Runtime
- Using Environment Test Data for Dynamic locators
- Import/Export Elements
- AI Enabled Auto-Healing
- test step recorder
- Install Chrome Extension
- Install Firefox Extension
- Install Edge Extension
- Exclude Attributes/Classes
- test plans
- Add, Edit, Delete Test Machines
- Add, Edit, Delete Test Suites
- Schedule Test Plans
- Run Test Suites In Parallel
- Cross Browser Testing
- Distributed Testing
- Headless Testing
- Test Lab Types
- Disabling Test Cases in Test Plans
- AfterTest Case
- Post Plan Hook
- AfterTest Suite
- Email Configuration in Test Plan
- Execute Partial Test Plans via API
- Ad-hoc Run
- Test Plan Executions
- Dry Runs on Local Devices
- Run Tests on Vendor Platforms
- Run Test Plans on Local Devices
- Test Locally Hosted Applications
- Debug Test Case Failures
- Parallel and Allowed queues
- debugging
- Debug results on local devices (Web applications)
- Debug Results on Local Devices
- Launch Debugger in the Same Window
- Testsigma Agent
- Pre-requisites
- Setup: Windows, Mac, Linux
- Setup: Android Local Devices
- Setting up iOS Local Devices
- Update Agent Manually
- Update Drivers Manually
- Delete Corrupted Agent
- Triggering Tests on Local Devices
- troubleshooting
- Agent - Startup and Registration Errors
- Fetching Agent logs
- Upgrade Testsigma Agent Automatically
- Testsigma Agent - FAQs
- continuous integration
- Test Plan Details
- REST API(Generic)
- Jenkins
- Azure DevOps
- AWS DevOps
- AWS Lambda
- Circle CI
- Bamboo CI
- Travis CI
- CodeShip CI
- Shell Script(Generic)
- Bitrise CI
- GitHub CICD
- Bitbucket CICD
- GitLab CI/CD
- desired capabilities
- Most Common Desired Capabilities
- Browser Console Debug Logs
- Geolocation Emulation
- Bypass Unsafe Download Prompt
- Geolocation for Chrome & Firefox
- Custom User Profile in Chrome
- Emulate Mobile Devices (Chrome)
- Add Chrome Extension
- Network Throttling
- Network Logs
- Biometric Authentication
- Enable App Resigning in iOS
- Enable Capturing Screenshots (Android & iOS)
- Configure Android WebViews
- Incognito/Private mode
- Set Google Play Store Credentials
- addons
- What is an Addon?
- Addons Community Marketplace
- Install Community Addon
- Prerequisites(Create/Update Addon)
- Create an Addon
- Update Addon
- Addon Types
- Create a Post Plan Hook add-on in Testsigma
- Create OCR Text Extraction Addon
- configuration
- API Keys
- Security(SSO)
- Setting Up Google Single Sign-On(SSO) Login in Testsigma
- Setting Up Okta Single Sign-On Integration with SAML Login in Testsigma
- Setting up SAML-based SSO login for Testsigma in Azure
- iOS Settings
- Creating WDA File for iOS App Testing
- uploads
- Upload Files
- Upload Android and iOS Apps
- How to generate mobile builds for Android/iOS applications?
- Testsigma REST APIs
- Environments
- Elements
- Test Plans
- Upload Files
- Get Project wide information
- Upload and update test data profile
- Trigger Multiple Test Plans
- Trigger Test Plan remotely and wait until Completion
- Run the same Test Plan multiple times in Parallel
- Schedule, Update and Delete a test plan using API
- Update Test Case results using API
- Create and update values of Test Data Profile using REST API
- Rerun Test Cases from Run Results using API
- open source dev environment setup
- macOS and IntelliJ Community Edition
- macOS and IntelliJ Ultimate Edition
- Windows and IntelliJ Ultimate Edition
- Setup Dev Environment [Addons]
- NLPs
- Unable to retrieve value stored in text element
- Unable to capture dropdown element
- Unable to Select Radiobutton
- Unable to Click Checkbox
- setup
- Server Docker Deployment Errors
- Secured Business Application Support
- Troubleshooting Restricted Access to Testsigma
- Why mobile device not displayed in Testsigma Mobile Test Recorder?
- Unable to create new test session due to unexpected error
- web apps
- URL not accessible
- Test Queued for a Long Time
- Issues with UI Identifiers
- Missing Elements in the Recorder
- mobile apps
- Failed to Start Mobile Test Recorder
- Troubleshooting “Failed to perform action Mobile Test Recorder” error
- Test Execution State is Queued for a Long Time
- Mobile app keeps stopping after successful launch
- More pre-requisite settings
- Unable to start WDA Process on iPhone
- Most Common causes for Click/Tap NLP failure
- on premise setup
- On-Premise Setup Prerequisites
- On-Premise Setup with Docker-compose File
- Post-Installation Checklist for On-Premise Setup
- Install Docker on an Unix OS in Azure Infrastructure
- SMTP Configuration in Testsigma
- Configure Custom Domains
- salesforce testing
- Intro: Testsigma for Salesforce Testing
- Creating a Connected App
- Creating a Salesforce Project
- Creating Metadata Connections
- Adding User Connections
- Build Test Cases: Manual+Live
- Salesforce Element Repositories
- Intro: Testsigma Special NLPs
Setting up SAML-based SSO login for Testsigma in Azure
With Azure (by Microsoft) Active Directory, users can automatically sign into their cloud-hosted/on-premise applications for a hassle-free, secure sign-in experience.
You can use the Azure Active Directory Admin Center to enable single sign-on (SSO) for Testsigma. After you configure SSO, your users can sign in to our application by using their Azure AD credentials.
Prerequisites
- Azure Account with Active Directory enabled
- Admin Access to Azure Account
I. Adding Testsigma Enterprise Application
-
Login to Azure portal using the URL : https://portal.azure.com
You will be taken to the home page as shown below:
- Click the View button below “Manage Azure Active Directory”.
- In the Active Directory Overview page, click on + New application and choose Enterprise Application
-
Click on + Create your own application In the overlay that opens up on the right, enter the name of the app you are integrating, i.e., Testsigma. Select option, ‘Integrate any other Application (Non-gallery)’ and click the Create button.
You’ll be taken to the newly added Testsigma overview page.
II. Adding Users to the Enterprise Application
- Click the Assign users and groups card to add the users in Azure AD to the recently added Testsigma app.
- Click on the + Add user/group on top
- In the next page, Add Assignment, click on the None selected link to open up the Users overlay. Select the required users from the Users overlay that opens up on the right.
- Click on the Select button to pick and finalize the users list. You can find the list of added Users at the left pane under Users.
- To add assignments to these users, click Assign.
III. SAML Configuration on Azure in Testsigma
- Back in Testsigma Overview page on Azure, click option 2 i.e, Set up single sign on.
- Select the SAML authentication option. You will be taken to the Setup Single Sign-on with SAML screen as shown below:
- Click on the Edit button on Section 1 - Basic SAML Configuration, enter the following details, and click Save:
Entity ID : https://app.testsigma.com/saml/
Reply URL : https://app.testsigma.com/saml/
Sign on URL : (Leave it empty)
Relay State : https://app.testsigma.com/saml/
Logout URL : (Leave it empty)
*You need to replace the
Back in your Testsigma account, navigate to Settings > Security. Choose the SAML card and click Proceed.
You will see an exclusive SAML token identifier for your account.
- You need to put this identifier in place of <id> in Step 3 and click Save.
- Click on the Edit button of Section 2 - User Attributes & Claims. Under Required claim, click the Claim name/Claim value.
- In the Manage Claim page that now appears, select Source attribute as user.email from the dropdown.
- Click Save and go back to the previous SAML-based Sign-on page.
- Click on the Edit button for section 3 - SAML Signing Certificate, enter the following details, and click Save:
Signing Option: SAML response and assertion
Signing Algorithm: SHA-256
That's all the configuration you need to perform on Azure App for SAML-based Sign-on.
- Now, navigate back to the SAML Sign-on page Download the XML file, ‘Federation Metadata XML’ by clicking the Download link under Section 3 - SAML Signing Certificate.
- Open the XML File and copy the value under the key EntityDescriptor > Signature > KeyInfo > X509Data > X509Certificate
You can just search for <X509Certificate> and copy the value between first occurrence of <X509Certificate> and <X509Certificate>
- Note down the following values from Section 4 - Set Up Testsigma App.
Azure AD Identifier
Login URL
We will use the X509Certificate value, also the values above in Testsigma app in the next section.
IV. Azure Specific SAML Configuration in Testsigma
Inside your Testsigma account, navigate to Settings>Security
- Click Proceed under SAML
Enter the following details:
- Entity ID: same as Azure AD Identifier (obtained from Section 4 in Azure SAML Setup page)
- SSO URL: same as Login URL (obtained from Section 4 in Azure SAML Setup page)
- SAML certificate: downloaded <X509Certificate> value (obtained in previous section from downloaded XML file). This value resides within the tag: <X509Certificate><X509Certificate> Paste this value.
- Click the Confirm button to finalize the changes.
SAML will now be enabled,
Let’s test the SSO.
V. Test the SAML Config
- On Section 5 of the Single Sign-On option, you will find the option to test. Click Test.
- To test the sign-in, click on the ‘Sign in as current user’ option.
This will test the SAML-based login with the currently logged-in user.
This will automatically log you into Testsigma.