Know How Guide and Hands on Guide for AWS
When you authentication for Kibana, you can
Elasticsearch 6.7 or later. To use this feature, you must enable fine-grained access control.Follow up the guide: Amazon ElasticSearch SAML Authentication for Kibana
The Kibana login flow can take one of two forms:
Service provider (SP) initiated: You navigate to Kibana (for example, https://
Identity provider (IdP) initiated: You navigate to your identity provider, log in, and choose Kibana from an application directory.
Amazon ES provides two single sign-on URLs, SP-initiated and IdP-initiated, you can choice any of them
You domain->Actions->Modify authentication -> Check Enable SAML authentication.IdP-initiated SSO URL: https://
SP-initiated SSO URL: https://


For Group Attribute Statements, we recommend adding role to the Name field and the regular expression as .+ to the Filter field.


Import from XML file button to import IdP metadata fileentityID property from your metadata file into the IDP entity IDProvide a SAML master username (only that user receives full permissions) and/or a SAML master backend role (any user who belongs to the group receives full permissions).
Subject key field empty to use the NameID element of the SAML assertion for the username, you can check the SAML preview to get correct attribute nameSpecify role from the assertion in the Role key field, you can check the SAML preview to get correct attribute name

Submit. The domain enters a processing state for approximately one minute and change to Active state
Tips: view a sample assertion during the process, and tools like SAML-tracer
A sample of saml assertion get from SAML-tracer
Security and Roles.
Map roles to allow other users to access Kibana with different permission
ESAmin to verify the full access to the KibanaESRead to verify the read only access to the Kibana