Delegate Authorization from Saml

I have setup single sign-on via saml and also completed a basic role map. I will like to switch from using role mapping to delegated authorization. So users authenticate via saml but authorization is handled by different realm. I have been reading this doc but cant get it right. This is how the elasticsearchyml looks like;

xpack.license.self_generated.type: trial true
            order: 2
            attributes.principal: nameid
            attributes.groups: ""
            idp.metadata.path: ""
            idp.entity_id: ""
            sp.entity_id: ""
            sp.acs: ""
            sp.logout: "" true certificate elastic-certificates.p12 elastic-certificates.p12
            order: 0
            order: 1
            url: ldap://
            bind_dn: 'CN=sa01.adscan,OU=Service Accounts,OU=Users,OU=TCS,DC=prd1,DC=example,DC=net'

And kibana.yml looks like this
    order: 0
    realm: kibana-realm
    description: "Log in with Azure AD"

So I will like to delegate saml authorization to native and active directory. How do I do that? I have tried adding this code to the saml-realm code block but it did not work.

 authorization_realms: my_ad

How do I delegate authorization to the realms 'native1' and 'my_ad' ?

but it did not work.

More information please.

Did you get an error? See message in the logs? What steps did you to take to determine whether it was working?

You've provided a great level of detail on your goal and current config, but missed the important bit about what went wrong.

I go an error that reads as follows;
"We couldn't log you in.
We hit an authentication error. Please check your credentials and try again. If you still can't log in, contact your system administrator"

It sounds like you need to look at the Kibana logs (and probably the Elasticsearch logs as well).

This topic was automatically closed 28 days after the last reply. New replies are no longer allowed.