SAML Authentication for Kibana

Know How Guide and Hands on Guide for AWS

SAML Authentication for Kibana

When you authentication for Kibana, you can

  1. Authenticating through Amazon Cognito
  2. Authenticating through the Fine-grained access control internal user database
  3. SAML authentication for Kibana lets you use your existing identity provider to offer single sign-on (SSO) for Kibana on domains running Elasticsearch 6.7 or later. To use this feature, you must enable fine-grained access control.

SAML Authentication for Kibana - Active Directory as the identity provider

Follow up the guide: Amazon ElasticSearch SAML Authentication for Kibana

The Kibana login flow can take one of two forms:

Amazon ES provides two single sign-on URLs, SP-initiated and IdP-initiated, you can choice any of them

  1. Enabling SAML Authentication
    • You domain->Actions->Modify authentication -> Check Enable SAML authentication.
    • Note the service provider entity ID and the two SSO URLs, you only need one of the SSO URLs ```bash Service provider entity ID: https://

IdP-initiated SSO URL: https:///_plugin/kibana/_opendistro/_security/saml/acs/idpinitiated

SP-initiated SSO URL: https:///_plugin/kibana/_opendistro/_security/saml/acs ```

  1. Configure the Active Directory
    • Go to the ADFS Management console and select Relying Party Trusts

    Right-click on it and select Add Relying Party Trust ad-add-trust

  1. Creating Claims Rules

    ad-claimrules

  1. Restart Active Directory Federation Service configure-ADFS-Restart-ADFS

  2. Create Active Directory
    • Group ESAdmin
    • User esadminuser@tsp.example.com belong to ESAdmin
    • Group ESRead
    • Login user esreader@tsp.example.com belong to ESRead
  3. After you configure your identity provider, it generates an IdP metadata file.

    Export SAML Metadata Document from https://adfs.tsp.example.com/FederationMetadata/2007-06/FederationMetadata.xml

  1. Access to kibana via https://es-domain/_plugin/kibana, the Active Directory SAML login window will shown up ad-kibana-ad-login
  1. After Kibana loads, choose Security and Roles. Map roles to allow other users to access Kibana with different permission

kibana-role-mapping

Reference

Steps to configure SAML 2.0 SSO with Microsoft Active Directory Federation Services

SAML Authentication for Kibana