|
@@ -125,7 +125,7 @@ xpack.security.authc.realms.saml.saml1:
|
|
|
idp.metadata.path: saml/idp-metadata.xml
|
|
|
idp.entity_id: "https://sso.example.com/"
|
|
|
sp.entity_id: "https://kibana.example.com/"
|
|
|
- sp.acs: "https://kibana.example.com/api/security/v1/saml"
|
|
|
+ sp.acs: "https://kibana.example.com/api/security/saml/callback"
|
|
|
sp.logout: "https://kibana.example.com/logout"
|
|
|
attributes.principal: "urn:oid:0.9.2342.19200300.100.1.1"
|
|
|
attributes.groups: "urn:oid:1.3.6.1.4.1.5923.1.5.1."
|
|
@@ -172,7 +172,7 @@ sp.acs::
|
|
|
or the IdP.
|
|
|
The correct value may vary depending on how you have installed {kib} and
|
|
|
whether there are any proxies involved, but it will typically be
|
|
|
- +$\{kibana-url}/api/security/v1/saml+ where _$\{kibana-url}_ is the base URL for
|
|
|
+ +$\{kibana-url}/api/security/saml/callback+ where _$\{kibana-url}_ is the base URL for
|
|
|
your {kib} instance.
|
|
|
|
|
|
sp.logout::
|
|
@@ -292,7 +292,7 @@ xpack.security.authc.realms.saml.saml1:
|
|
|
idp.metadata.path: saml/idp-metadata.xml
|
|
|
idp.entity_id: "https://sso.example.com/"
|
|
|
sp.entity_id: "https://kibana.example.com/"
|
|
|
- sp.acs: "https://kibana.example.com/api/security/v1/saml"
|
|
|
+ sp.acs: "https://kibana.example.com/api/security/saml/callback"
|
|
|
attributes.principal: "nameid:persistent"
|
|
|
attributes.groups: "roles"
|
|
|
------------------------------------------------------------
|
|
@@ -337,7 +337,7 @@ xpack.security.authc.realms.saml.saml1:
|
|
|
idp.metadata.path: saml/idp-metadata.xml
|
|
|
idp.entity_id: "https://sso.example.com/"
|
|
|
sp.entity_id: "https://kibana.example.com/"
|
|
|
- sp.acs: "https://kibana.example.com/api/security/v1/saml"
|
|
|
+ sp.acs: "https://kibana.example.com/api/security/saml/callback"
|
|
|
attributes.principal: "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress"
|
|
|
attribute_patterns.principal: "^([^@]+)@staff\\.example\\.com$"
|
|
|
------------------------------------------------------------
|
|
@@ -744,7 +744,7 @@ The three additional settings that are required for SAML support are shown below
|
|
|
------------------------------------------------------------
|
|
|
xpack.security.authc.providers: [saml]
|
|
|
xpack.security.authc.saml.realm: saml1
|
|
|
-server.xsrf.whitelist: [/api/security/v1/saml]
|
|
|
+server.xsrf.whitelist: [/api/security/saml/callback]
|
|
|
------------------------------------------------------------
|
|
|
|
|
|
The configuration values used in the example above are:
|
|
@@ -816,7 +816,7 @@ xpack.security.authc.realms.saml.saml_finance:
|
|
|
idp.metadata.path: saml/idp-metadata.xml
|
|
|
idp.entity_id: "https://sso.example.com/"
|
|
|
sp.entity_id: "https://kibana.finance.example.com/"
|
|
|
- sp.acs: "https://kibana.finance.example.com/api/security/v1/saml"
|
|
|
+ sp.acs: "https://kibana.finance.example.com/api/security/saml/callback"
|
|
|
sp.logout: "https://kibana.finance.example.com/logout"
|
|
|
attributes.principal: "urn:oid:0.9.2342.19200300.100.1.1"
|
|
|
attributes.groups: "urn:oid:1.3.6.1.4.1.5923.1.5.1."
|
|
@@ -825,7 +825,7 @@ xpack.security.authc.realms.saml.saml_sales:
|
|
|
idp.metadata.path: saml/idp-metadata.xml
|
|
|
idp.entity_id: "https://sso.example.com/"
|
|
|
sp.entity_id: "https://kibana.sales.example.com/"
|
|
|
- sp.acs: "https://kibana.sales.example.com/api/security/v1/saml"
|
|
|
+ sp.acs: "https://kibana.sales.example.com/api/security/saml/callback"
|
|
|
sp.logout: "https://kibana.sales.example.com/logout"
|
|
|
attributes.principal: "urn:oid:0.9.2342.19200300.100.1.1"
|
|
|
attributes.groups: "urn:oid:1.3.6.1.4.1.5923.1.5.1."
|
|
@@ -834,7 +834,7 @@ xpack.security.authc.realms.saml.saml_eng:
|
|
|
idp.metadata.path: saml/idp-external.xml
|
|
|
idp.entity_id: "https://engineering.sso.example.net/"
|
|
|
sp.entity_id: "https://kibana.engineering.example.com/"
|
|
|
- sp.acs: "https://kibana.engineering.example.com/api/security/v1/saml"
|
|
|
+ sp.acs: "https://kibana.engineering.example.com/api/security/saml/callback"
|
|
|
sp.logout: "https://kibana.engineering.example.com/logout"
|
|
|
attributes.principal: "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn"
|
|
|
------------------------------------------------------------
|