Hello There,
I am trying to enable saml for cloud deployment running with 8.3.2 version by following the below docs
As a first step I am trying to add the below configuration in elasticsearch yml file.
xpack.security.authc.realms.saml.saml1:
order: 2
idp.metadata.path: "https://login.microsoftonline.com/****************/federationmetadata/2007-06/federationmetadata.xml?appid=********1"
idp.entity_id: "http://stfs.bosch.com/adfs/services/trust"
sp.entity_id: "https://name.kb.westeurope.azure.elastic-cloud.com:**"
sp.acs: "https://name.kb.westeurope.azure.elastic-cloud.com:**/api/security/saml/callback"
sp.logout: "https://name.kb.westeurope.azure.elastic-cloud.com:**/logout"
attributes.principal: "urn:oid:0.9.2342.19200300.100.1.1"
attributes.groups: "urn:oid:1.3.6.1.4.1.5923.1.5.1."
Since the above onw dint worked tried the below one (More or less same )
xpack.security.authc.realms.saml.kibana-realm:
order: 2
attributes.principal: nameid
attributes.groups: "http://schemas.microsoft.com/ws/2008/06/identity/claims/groups"
idp.metadata.path: "https://login.microsoftonline.com/*******/federationmetadata/2007-06/federationmetadata.xml?appid=*****51"
idp.entity_id: "http://stfs.bosch.com/adfs/services/trust"
sp.entity_id: "https://name.kb.westeurope.azure.elastic-cloud.com:**"
sp.acs: "https://name.kb.westeurope.azure.elastic-cloud.com:**/api/security/saml/callback"
sp.logout: "https://name.kb.westeurope.azure.elastic-cloud.com:**/logout"
However the deployment does not accept the above configuration and after cluster restart I could not see the above settigs in deployment.
Any inputs on this topic from anyone ? why does the deployment does not accept the configuration.