Dear Elastic,
Those 2 days I've been fighting with Elastic Cloud auth with AWS SSO,
But It doesn't work, I don't know what am I missing about configuration on Elastic Cloud or AWS SSO.
Please don't post images of text as they are hard to read, may not display correctly for everyone, and not searchable. It's fine to post screenshots to further highlight your issues but do add details in text too.
The error message that AWS SSO gives you is
"Request NameID Format doesn't match our record"
This implies that the Elastic Stack sends a SAML Authentication Request with a NameIDPolicy Format that AWS SSO doesn't like. As you can see in our docs :
nameid_format
The NameID format that should be requested when asking the IdP to authenticate the current user. Defaults to requesting transient names (urn:oasis:names:tc:SAML:2.0:nameid-format:transient).
this defaults to urn:oasis:names:tc:SAML:2.0:nameid-format:transient. Given the fact that you want to use persistent NameIDs , as I can see from the rest of the configuration and you have configured AWS SSO accordingly too, what you'd need to do is to configure the Elastic Stack SAML SP to also request that format. To do so , add
Yes, apologies, I should have noted this is Elastic Cloud and as such this is currently not a whitelisted config value. Can you please engage with your support engineer? They will be able to apply this setting for your cluster - feel free to mention this post here, and I will provide them with additional details if needed.
There has a new issue found after we enabled Kibana SSO.
We can only see an attribute with subject on AWS Application SSO settings, Don't know if it's normal? when I logged on to Kibana with my AD account(robin.guo), It's not the username that what I logged on.
Could you please advise which attributes should we in place between elastic cloud and AWS SSO?
The default mappings between AWS SSO and Microsoft AD as following
User attribute in AWS SSO
Maps to this attribute in your Microsoft AD directory
You have configured AWS SSO to use the literal string "subject" as the value of the SAML NameID and then you have also configured Elasticsearch to map the value of SAML NameID to the principal user attribute in Elasticsearch. Thus, the principal user attribute in Elasticsearch gets the value "subject". This is all expected behavior based on your configuration.
You should probably want to change the literal sting "subject" in your AWS SSO config to something from the list you have shared above ( like the default value ${dir:windowsUpn} that will get the appropriate value from your AD
Apache, Apache Lucene, Apache Hadoop, Hadoop, HDFS and the yellow elephant
logo are trademarks of the
Apache Software Foundation
in the United States and/or other countries.