- Section about the case where the `principal` user property can't be mapped. - Section about when the IdP SAML metadata do not contain a SingleSignOnService that supports HTTP-Redirect binding. Co-Authored-By: Lisa Cawley <lcawley@elastic.co> Co-Authored-By: Tim Vernum <tim@adjective.org>
This commit is contained in:
parent
834f2b4546
commit
cece5f24f7
|
@ -240,6 +240,7 @@ The recommended steps for configuring these SAML attributes are as follows:
|
|||
in your IdP. In the example above, we have configured the `principal` and
|
||||
`groups` attributes.
|
||||
|
||||
[[saml-attribute-mapping-nameid]]
|
||||
===== Special attribute names
|
||||
|
||||
In general, {es} expects that the configured value for an attribute will be a
|
||||
|
|
|
@ -535,6 +535,57 @@ placeholder is used instead. To diagnose the _actual_ problem, you must check
|
|||
the {es} logs for further details.
|
||||
--
|
||||
|
||||
. *Symptoms:*
|
||||
+
|
||||
--
|
||||
Authentication in {kib} fails and the following error is printed in the {es}
|
||||
logs:
|
||||
|
||||
....
|
||||
Authentication to realm <saml-realm-name> failed - SAML Attribute [<AttributeName0>] for
|
||||
[xpack.security.authc.realms.saml.<saml-realm-name>.attributes.principal] not found in saml attributes
|
||||
[<AttributeName1>=<AttributeValue1>, <AttributeName2>=<AttributeValue2>, ...] or NameID [ NameID(format)=value ]
|
||||
....
|
||||
|
||||
*Resolution:*
|
||||
|
||||
This error indicates that {es} failed to find the necessary SAML attribute in the SAML response that the
|
||||
Identity Provider sent. In this example, {es} is configured as follows:
|
||||
....
|
||||
xpack.security.authc.realms.saml.<saml-realm-name>.attributes.principal: AttributeName0
|
||||
....
|
||||
This configuration means that {es} expects to find a SAML Attribute with the name `AttributeName0` or a `NameID` with the appropriate format in the SAML
|
||||
response so that <<saml-attribute-mapping,it can map it>> to the `principal` user property. The `principal` user property is a
|
||||
mandatory one, so if this mapping can't happen, the authentication fails.
|
||||
|
||||
If you are attempting to map a `NameID`, make sure that the expected `NameID` format matches the one that is sent.
|
||||
See <<saml-attribute-mapping-nameid>> for more details.
|
||||
|
||||
If you are attempting to map a SAML attribute and it is not part of the list in the error message, it might mean
|
||||
that you have misspelled the attribute name, or that the IdP is not sending this particular attribute. You might
|
||||
be able to use another attribute from the list to map to `principal` or consult with your IdP administrator to
|
||||
determine if the required attribute can be sent.
|
||||
|
||||
--
|
||||
|
||||
. *Symptoms:*
|
||||
+
|
||||
--
|
||||
Authentication in {kib} fails and the following error is printed in the {es}
|
||||
logs:
|
||||
|
||||
....
|
||||
Cannot find [{urn:oasis:names:tc:SAML:2.0:metadata}IDPSSODescriptor]/[urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect] in descriptor
|
||||
....
|
||||
|
||||
*Resolution:*
|
||||
|
||||
This error indicates that the SAML metadata for your Identity Provider do not contain a `<SingleSignOnService>` endpoint with binding of
|
||||
HTTP-Redirect (urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect). {es} supports only the `HTTP-Redirect` binding for SAML authentication
|
||||
requests (and it doesn't support the `HTTP-POST` binding). Consult your IdP administrator in order to enable at least one
|
||||
`<SingleSignOnService>` supporting `HTTP-Redirect` binding and update your IdP SAML Metadata.
|
||||
--
|
||||
|
||||
. *Symptoms:*
|
||||
+
|
||||
--
|
||||
|
|
Loading…
Reference in New Issue