Change /_plugins/_security/.. routes to /_opendistro/_security/... for SAML until plugins route is supported (#877)

Signed-off-by: Craig Perkins <cwperx@amazon.com>

Signed-off-by: Craig Perkins <cwperx@amazon.com>
This commit is contained in:
Craig Perkins 2022-08-11 18:41:30 -04:00 committed by GitHub
parent c280b58b77
commit 206e97a2b7
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 4 additions and 4 deletions

View File

@ -305,13 +305,13 @@ opensearch_security.auth.type: "saml"
In addition, you must add the OpenSearch Dashboards endpoint for validating the SAML assertions to your allow list:
```yml
server.xsrf.allowlist: ["/_plugins/_security/saml/acs"]
server.xsrf.allowlist: ["/_opendistro/_security/saml/acs"]
```
If you use the logout POST binding, you also need to ad the logout endpoint to your allow list:
```yml
server.xsrf.allowlist: ["/_plugins/_security/saml/acs", "/_plugins/_security/saml/logout"]
server.xsrf.allowlist: ["/_opendistro/_security/saml/acs", "/_opendistro/_security/saml/logout"]
```
### IdP-initiated SSO
@ -319,11 +319,11 @@ server.xsrf.allowlist: ["/_plugins/_security/saml/acs", "/_plugins/_security/sam
To use IdP-initiated SSO, set the Assertion Consumer Service endpoint of your IdP to this:
```
/_plugins/_security/saml/acs/idpinitiated
/_opendistro/_security/saml/acs/idpinitiated
```
Then add this endpoint to `server.xsrf.allowlist` in `opensearch_dashboards.yml`:
```yml
server.xsrf.allowlist: ["/_plugins/_security/saml/acs/idpinitiated", "/_plugins/_security/saml/acs", "/_plugins/_security/saml/logout"]
server.xsrf.allowlist: ["/_opendistro/_security/saml/acs/idpinitiated", "/_opendistro/_security/saml/acs", "/_opendistro/_security/saml/logout"]
```