Know How Guide and Hands on Guide for AWS
When you authentication for Kibana, you can
Elasticsearch 6.7 or later. To use this feature, you must enable fine-grained access control.Follow up the guide: Amazon ElasticSearch SAML Authentication for Kibana
The Kibana login flow can take one of two forms:
Service provider (SP) initiated: You navigate to Kibana (for example, https://
Identity provider (IdP) initiated: You navigate to your identity provider, log in, and choose Kibana from an application directory.
Amazon ES provides two single sign-on URLs, SP-initiated and IdP-initiated, you can choice any of them
You domain->Actions->Modify authentication -> Check Enable SAML authentication.IdP-initiated SSO URL: https://
SP-initiated SSO URL: https://
ADFS Management console and select Relying Party TrustsRight-click on it and select Add Relying Party Trust

Select Data Source step
Select the last option: Enter data about the relying party manually

Enter a Display name

Select AD FS profile

Leave the default values for Configure Certificate

Configure URL, select Enable support for the SAML 2.0 WebSSO protocol.
Enter the value of SP-initiated SSO URL on Kibana console

Add Relying party trust identifier
Enter the value of Service provider entity ID on Kibana console

Do not enable MFA

Next, Choose Permit all users to access this relying party

Next, Leave the default values

On the Final screen
Select Open the Edit Claim Rules dialog and use the Close button to exit.

Creating Claims Rules

Add the first rule as Email, Select Send LDAP Attributes as Claims

Add the second rule as NameId, Select Transform an Incoming Claim

Add the third rule as Role, Select Send LDAP Attributes as Claims

Restart Active Directory Federation Service

ESAdminesadminuser@tsp.example.com belong to ESAdminESReadesreader@tsp.example.com belong to ESReadAfter you configure your identity provider, it generates an IdP metadata file.
Export SAML Metadata Document from https://adfs.tsp.example.com/FederationMetadata/2007-06/FederationMetadata.xml
Import from XML file button to import IdP metadata fileentityID property from your metadata file into the IDP entity IDProvide a SAML master username (only that user receives full permissions) and/or a SAML master backend role (any user who belongs to the group receives full permissions).

Subject key field empty to use the NameID element of the SAML assertion for the username, you can check the SAML preview to get correct attribute nameSpecify http://schemas.microsoft.com/ws/2008/06/identity/claims/role from the assertion in the Role key field, you can check the SAML preview to get correct attribute name

Submit. The domain enters a processing state for approximately one minute and change to Active state
Login user esadminuser@tsp.example.com belong to ESAdmin
Tips: view a sample assertion during the process, and tools like SAML-tracer
A sample of saml assertion get from SAML-tracer
Security and Roles.
Map roles to allow other users to access Kibana with different permission
esreader@tsp.example.com belong to ESRead to verify the read only access to the KibanaSteps to configure SAML 2.0 SSO with Microsoft Active Directory Federation Services