How does Spacelift handle SAML certificate updates and key rollover?
Last updated: September 9, 2025
When your SAML Identity Provider's x.509 certificate changes, Spacelift's behavior depends on how your SAML integration was configured - either in dynamic or static mode.
Dynamic Configuration
If you have Dynamic configuration enabled, Spacelift automatically re-fetches your IdP's metadata (including certificate updates and key rollover) on each login attempt. This means certificate changes are handled automatically without any manual intervention required.
Dynamic configuration is enabled when you provide a metadata URL during SAML setup rather than uploading static metadata files.
Static Metadata
If Dynamic configuration is disabled, you provided a one-time metadata XML (or JSON-escaped string) when you first activated SSO. In this case, Spacelift only reads that metadata once at activation time and will not automatically detect certificate changes.
For static configurations, you'll need to manually update the SAML integration when certificates change.
Updating Static SAML Configuration
To update a static SAML configuration with new certificate information:
Disable SSO in your Spacelift settings (this will immediately remove the integration and invalidate existing sessions)
Re-configure the SAML integration with the updated metadata as outlined in the SAML setup documentation
Checking Your Configuration Type
If you have an IdP metadata URL configured in your SAML settings, you're likely using dynamic configuration. If you're unsure about your setup type, you can check your SAML integration settings to see whether a metadata URL or static metadata was provided.
Important Recommendation
Before making any changes to your SAML configuration, we strongly recommend setting up backup credentials to avoid being locked out of your account during the transition.