• Home
  • Categories
  • Recent
  • Popular
  • Pricing
  • Contact us
  • Docs
  • Login
FusionAuth
  • Home
  • Categories
  • Recent
  • Popular
  • Pricing
  • Contact us
  • Docs
  • Login

Integrate FusionAuth with Elastic Cloud

Scheduled Pinned Locked Moved
General Discussion
0
11
1.5k
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • V
    vexana
    last edited by 28 Jan 2021, 03:46

    Hi Everyone,

    I am trying to integrate FusionAuth(v1.23.2) as Identity Provider to my Elastic Cloud(v7.10.2).

    I configure the Application (SAML) on the FusionAuth side and adding some config changes to my elastic cloud (creating realm with name saml1):

    elasticsearch.yaml

    xpack: 
      security: 
        authc: 
          realms: 
            saml: 
              saml1: 
                attributes.principal: "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress"
                attributes.groups: "roles"
                idp.entity_id: "xxx"
                idp.metadata.path: "xxx"
                order: 2
                sp.acs: "xxx/api/security/v1/saml"
                sp.entity_id: "xxx/"
                sp.logout: "xxx/logout"
    

    kibana.yaml

    xpack.security.authc.providers:
      saml.saml1:
        order: 0
        realm: saml1
        description: "Log in with SAML" 
      basic.basic1:
        order: 1
    

    The login via SAML failed and give me this error on Kibana side

    {"statusCode":401,"error":"Unauthorized","message":"[security_exception] unable to authenticate user [<unauthenticated-saml-user>] for action [cluster:admin/xpack/security/saml/authenticate], with { header={ WWW-Authenticate={ 0=\"Basic realm=\\\"security\\\" charset=\\\"UTF-8\\\"\" & 1=\"Bearer realm=\\\"security\\\"\" & 2=\"ApiKey\" } } }"}
    

    And, I'm finding the error on the FusionAuth side related to the NameID

    The SAML AuthnRequest was invalid and/or did not pass validation. The error code is [InvalidNameIDPolicy] and the error message is [The AuthnRequest contained an invalid NameId policy. FusionAuth only supports the [urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress] or [urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified] policy]
    

    Is there anyone facing some problem?

    1 Reply Last reply Reply Quote 0
    • R
      robotdan
      last edited by 29 Jan 2021, 15:27

      What NameIdPolicy options does Kibana support?

      1 Reply Last reply Reply Quote 0
      • V
        vexana
        last edited by 1 Feb 2021, 03:01

        @robotdan said in Integrate FusionAuth with Elastic Cloud:

        NameIdPolicy

        By referring to this documentation https://www.elastic.co/guide/en/elasticsearch/reference/master/saml-guide-authentication.html#saml-attribute-mapping,

        It's only mentioned nameid, nameid:persistent and friendlyName.

        1 Reply Last reply Reply Quote 0
        • R
          robotdan
          last edited by 1 Feb 2021, 03:45

          Likely the same issue as described here https://github.com/FusionAuth/fusionauth-issues/issues/522

          1 Reply Last reply Reply Quote 0
          • V
            vexana
            last edited by 1 Feb 2021, 05:25

            Got it.

            So, currently it's only support urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress from FusionAuth side, right?

            1 Reply Last reply Reply Quote 0
            • R
              robotdan
              last edited by 1 Feb 2021, 15:10

              I believe that is correct.

              https://github.com/FusionAuth/fusionauth-issues/issues/522#issuecomment-685851566

              @dan do we have this limitation documented anywhere that you know of?

              @vexana you can add a comment to that issue if you want to mention it also impacts integration with Elasticsearch SAML authentication.

              If Elasticsearch supports OpenID Connect, that may be an option for you.

              1 Reply Last reply Reply Quote 0
              • D
                dan
                last edited by 2 Feb 2021, 22:50

                @robotdan no, we don't. I'll document that in the https://fusionauth.io/docs/v1/tech/reference/limitations/ section.

                --
                FusionAuth - Auth for devs, built by devs.
                https://fusionauth.io

                1 Reply Last reply Reply Quote 0
                • D
                  dan
                  last edited by 5 Feb 2021, 16:20

                  Looks like you can also integrate to elastic cloud using OIDC: https://discuss.elastic.co/t/elastic-cloud-integration-with-fusionauth/263323

                  --
                  FusionAuth - Auth for devs, built by devs.
                  https://fusionauth.io

                  V 1 Reply Last reply 8 Feb 2021, 03:29 Reply Quote 0
                  • V
                    vexana @dan
                    last edited by 8 Feb 2021, 03:29

                    @dan Yap, I am the same person asking about that. I am asking on the elastic forum about the OIDC.

                    Currently, still having a problem integrating it. (I'll update on here also if finding the solution).

                    D 1 Reply Last reply 8 Feb 2021, 20:54 Reply Quote 0
                    • D
                      dan @vexana
                      last edited by 8 Feb 2021, 20:54

                      @vexana It seems like you succeeded based on the last post. Is that the case?

                      --
                      FusionAuth - Auth for devs, built by devs.
                      https://fusionauth.io

                      V 1 Reply Last reply 11 Feb 2021, 06:48 Reply Quote 0
                      • D
                        dan
                        last edited by 13 Feb 2021, 20:47

                        @vexana succeeded, but had another question, so I forked the topic: https://fusionauth.io/community/forum/topic/811/mapping-fusionauth-roles-to-elasticsearch

                        --
                        FusionAuth - Auth for devs, built by devs.
                        https://fusionauth.io

                        1 Reply Last reply Reply Quote 0
                        10 out of 11
                        • First post
                          10/11
                          Last post