SAML Authentication for Kibana

Know How Guide and Hands on Guide for AWS

SAML Authentication for Kibana

When you authentication for Kibana, you can

  1. Authenticating through Amazon Cognito
  2. Authenticating through the Fine-grained access control internal user database
  3. SAML authentication for Kibana lets you use your existing identity provider to offer single sign-on (SSO) for Kibana on domains running Elasticsearch 6.7 or later. To use this feature, you must enable fine-grained access control.

SAML Authentication for Kibana - Okta as the identity provider

Follow up the guide: Amazon ElasticSearch SAML Authentication for Kibana

The Kibana login flow can take one of two forms:

Amazon ES provides two single sign-on URLs, SP-initiated and IdP-initiated, you can choice any of them

  1. Enabling SAML Authentication
    • You domain->Actions->Modify authentication -> Check Enable SAML authentication.
    • Note the service provider entity ID and the two SSO URLs, you only need one of the SSO URLs ```bash Service provider entity ID: https://

IdP-initiated SSO URL: https:///_plugin/kibana/_opendistro/_security/saml/acs/idpinitiated

SP-initiated SSO URL: https:///_plugin/kibana/_opendistro/_security/saml/acs ```

  1. Configure the Okta
    • In Okta, for example, you create a “SAML 2.0 application.” saml-app-okta

For Group Attribute Statements, we recommend adding role to the Name field and the regular expression as .+ to the Filter field. saml-app-okta-group-attri

  1. After you configure your identity provider, it generates an IdP metadata file. saml-app-okta-idp-metadata
  1. Access to kibana via https://es-domain/_plugin/kibana, the Okta SAML login window will shown up saml-login-kibana

Tips: view a sample assertion during the process, and tools like SAML-tracer

A sample of saml assertion get from SAML-tracer

  1. After Kibana loads, choose Security and Roles. Map roles to allow other users to access Kibana with different permission

kibana-role-mapping

Reference

OKTA Apps_App_Integration_Wizard_SAML

SAML Authentication for Kibana