Know How Guide and Hands on Guide for AWS
When you authentication for Kibana, you can
Elasticsearch 6.7 or later
. To use this feature, you must enable fine-grained access control
.Follow up the guide: Amazon ElasticSearch SAML Authentication for Kibana
The Kibana login flow can take one of two forms:
Service provider (SP) initiated: You navigate to Kibana (for example, https://
Identity provider (IdP) initiated: You navigate to your identity provider, log in, and choose Kibana from an application directory.
Amazon ES provides two single sign-on URLs, SP-initiated
and IdP-initiated
, you can choice any of them
You domain
->Actions
->Modify authentication
-> Check Enable SAML authentication
.IdP-initiated SSO URL: https://
SP-initiated SSO URL: https://
For Group Attribute Statements, we recommend adding role
to the Name field and the regular expression
as .+
to the Filter field.
Import from XML file
button to import IdP metadata file
entityID
property from your metadata file into the IDP entity ID
Provide a SAML master username
(only that user receives full permissions) and/or a SAML master backend role
(any user who belongs to the group receives full permissions).
Subject key
field empty
to use the NameID
element of the SAML assertion for the username, you can check the SAML preview to get correct attribute name
Specify role
from the assertion in the Role key
field, you can check the SAML preview to get correct attribute name
Submit
. The domain enters a processing
state for approximately one minute and change to Active
stateTips: view a sample assertion during the process, and tools like SAML-tracer
A sample of saml assertion get from SAML-tracer
Security
and Roles
.
Map
roles to allow other users to access Kibana with different permissionESAmin
to verify the full access to the KibanaESRead
to verify the read only access to the Kibana