Hello,
I had been trying to get Kibana to work with SAML authentication, but with no luck.
[2018-08-16T21:54:02,824][WARN ][o.e.x.s.a.AuthenticationService] [ip-x-x-x-x-ip-x-x-x-x.ec2.internal] Authentication to realm saml1 failed - Provided SAML response is not valid for realm saml/saml1 (Caused by ElasticsearchSecurityException[Conditions [https://accounts.google.com/o/sa...] do not match required audience [https://kibana6.qa.internal:80/]])
Thanks,
Ashok
Here's my settings below:
Kibana Config
server.port: 80
server.host: "0.0.0.0"
elasticsearch.username: kibana
elasticsearch.password: <*******>
xpack.security.authProviders: [saml,basic]
server.xsrf.whitelist: [/api/security/v1/saml]
server.ssl.enabled: true
server.ssl.key: /pathtokey
server.ssl.certificate: /path to cert
elasticsearch.ssl.verificationMode: certificate
elasticsearch.ssl.certificateAuthorities: /pathtocertificatepem file
xpack.security.encryptionKey: "************
ES Config
bootstrap.memory_lock: true
cluster.name: es_qa_std
discovery.ec2.tag.designation: std
discovery.ec2.tag.environment: qa
discovery.ec2.tag.role: elasticsearch6
discovery.zen.hosts_provider: ec2
network.host: x.x.x.x
node.name: ip-x-x-x-x.ec2.internal
path.data: "/mnt/elasticsearch/ip-x-x-x-x.ec2.internal_data/ip-x-x-x-x.ec2.internal"
path.logs: "/var/log/elasticsearch/ip-x-x-x-x.ec2.interna"
node.max_local_storage_nodes: 2
xpack.security.enabled: true
xpack.security.transport.ssl.enabled: true
xpack.security.transport.ssl.verification_mode: certificate
xpack.security.transport.ssl.certificate: es1.crt
xpack.security.transport.ssl.key: es1.key
xpack.security.transport.ssl.certificate_authorities: ca.crt
xpack.security.http.ssl.enabled: true
xpack.security.http.ssl.verification_mode: certificate
xpack.security.http.ssl.certificate: es1.crt
xpack.security.http.ssl.key: es1.key
xpack.security.http.ssl.certificate_authorities: ca.crt
xpack.security.authc.realms.native1:
type: native
order: 0
xpack.security.authc.realms.saml1:
type: saml
order: 1
idp.metadata.path: saml/idp-metadata.xml
idp.entity_id: "https://accounts.google.com/o/saml2?idpid=xxxxxxx"
sp.entity_id: "https://kibana6.qa.internal:80/"
sp.acs: "https://kibana6.qa.internal:80/api/security/v1/saml"
sp.logout: "https://kibana6.qa.internal:80/logout"
attributes.principal: "nameid:persistent"