-
Notifications
You must be signed in to change notification settings - Fork 16
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
ef43930
commit 0e6e80f
Showing
15 changed files
with
419 additions
and
330 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,70 +2,74 @@ | |
title: Add Microsoft Azure Active Directory as an identity provider | ||
sidebar_label: Microsoft Azure Active Directory | ||
--- | ||
<!-- vale off --> | ||
import IdPStep1 from "@site/static/includes/idp-step1.md"; | ||
import IdPStep3 from "@site/static/includes/idp-step3.md" | ||
|
||
Use [Microsoft Azure Active Directory (AD)](https://azure.microsoft.com/en-us/products/active-directory/) to give your organization users single sign-on (SSO) access to Aiven. | ||
<!-- vale on --> | ||
|
||
## Prerequisite steps in Aiven Console | ||
Use [Microsoft Azure Active Directory (AD)](https://azure.microsoft.com/en-us/products/active-directory/) to give your organization users single sign-on (SSO) access to Aiven. | ||
|
||
Add Azure as a SAML | ||
[identity provider](/docs/platform/howto/saml/add-identity-providers#add-idp-aiven-console) in the Console. | ||
<IdPStep1/> | ||
|
||
## Configure SAML on Microsoft Azure {#configure-saml-azure} | ||
## Step 2: Configure SAML on Microsoft Azure | ||
|
||
### Set up an Azure application | ||
|
||
1. Log in to [Microsoft Azure](https://portal.azure.com/). | ||
1. Got to **Enterprise applications**. | ||
1. Select **All applications**. | ||
1. Go to **Enterprise applications**. | ||
1. Click **All applications**. | ||
1. Click **New application**. | ||
1. Select the **Add from the gallery** search bar and use the **Azure | ||
AD SAML Toolkit**. | ||
1. Click the **Add from the gallery** search bar and use the **Azure AD SAML Toolkit**. | ||
1. Click **Add**. | ||
1. Go back to the **Enterprise applications** list. | ||
|
||
:::note | ||
The newly created application might not be visible yet. You can use | ||
The newly created application might not be visible. You can use | ||
the **All applications** filter to see the new application. | ||
::: | ||
|
||
1. Click the name of the new application. The configuration opens. | ||
1. Select **Single sign-on** configuration. | ||
1. Click the name of the new application. | ||
1. Click **Single sign-on**. | ||
1. Select **SAML** as the single sign-on method. | ||
1. Add the following parameters to the **Basic SAML Configuration**: | ||
|
||
| Parameter | Value | | ||
| -------------------------------------------- | ---------------------------------------------------------------------------------------------------------- | | ||
| `Identifier (Entity ID)` | `https://api.aiven.io/v1/sso/saml/account/{account_id}/method/{account_authentication_method_id}/metadata` | | ||
| `Reply URL (Assertion Consumer Service URL)` | `https://api.aiven.io/v1/sso/saml/account/{account_id}/method/{account_authentication_method_id}/acs` | | ||
| `Sign on URL` | `https://console.aiven.io` | | ||
| Parameter | Value | | ||
| ------------------------------------------ | -------------------------------------------------------------------------------------------------------- | | ||
| Identifier (Entity ID) | https://api.aiven.io/v1/sso/saml/account/{account_id}/method/{account_authentication_method_id}/metadata | | ||
| Reply URL (Assertion Consumer Service URL) | https://api.aiven.io/v1/sso/saml/account/{account_id}/method/{account_authentication_method_id}/acs | | ||
| Sign on URL | https://console.aiven.io | | ||
|
||
1. Click **Save**. | ||
|
||
### Create a claim and add users | ||
|
||
1. In the **User Attributes & Claims**, click **Add a new claim**. | ||
1. Create an attribute with the following data: | ||
1. Create an attribute with the following: | ||
|
||
| Parameter | Value | | ||
| ------------------ | ----------- | | ||
| `Name` | `email` | | ||
| `Source` | `Attribute` | | ||
| `Source Attribute` | `user.mail` | | ||
| Parameter | Value | | ||
| ---------------- | --------- | | ||
| Name | email | | ||
| Source | Attribute | | ||
| Source Attribute | user.mail | | ||
|
||
1. Download the **Certificate (Base64)** from the **SAML Signing | ||
Certificate** section. | ||
1. Download the **Certificate (Base64)** from the **SAML Signing Certificate** section. | ||
1. Go to **Users and groups** and click **Add user**. | ||
1. Select the users that will use Azure AD to log in to Aiven. | ||
1. Click **Assign**. | ||
|
||
## Finish the configuration in Aiven | ||
## Step 3: Finish the configuration in Aiven | ||
|
||
Go back to the Aiven Console to | ||
[configure the IdP](/docs/platform/howto/saml/add-identity-providers#configure-idp-aiven-console) and complete the setup. | ||
Go back to the Aiven Console to complete setting up the IdP. If you saved your IdP as a | ||
draft, you can open the settings by clicking the name of the IdP. | ||
|
||
1. In the **IDP URL** field, enter the **Login URL** from Azure. | ||
1. In the **Entity Id** field, enter the **Azure AD Identifier** from Azure. | ||
<IdPStep3/> | ||
|
||
## Troubleshooting | ||
|
||
If you get an error message suggesting you contact your administrator: | ||
If you get an error message to contact your administrator: | ||
|
||
1. Go to the Microsoft Azure AD user profile for the users. | ||
1. In **Contact Info**, check whether the **Email** field is blank. | ||
|
@@ -78,8 +82,3 @@ If it is blank, there are two possible solutions: | |
- In **Contact Info**, if none of the **Alternate email** fields are | ||
blank, try changing the **User Attributes & Claims** to | ||
`email = user.othermail`. | ||
|
||
If you still have login issues, you can use the [SAML Tracer browser | ||
extension](https://addons.mozilla.org/firefox/addon/saml-tracer/) to | ||
check the process step by step. If this doesn't work, get in touch with | ||
our support team at [[email protected]](mailto:[email protected]). |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,42 +2,43 @@ | |
title: Add FusionAuth as an identity provider | ||
sidebar_label: FusionAuth | ||
--- | ||
<!-- vale off --> | ||
import IdPStep1 from "@site/static/includes/idp-step1.md"; | ||
import IdPStep3 from "@site/static/includes/idp-step3.md" | ||
|
||
Use [FusionAuth](https://fusionauth.io/) to give your organization users single sign-on (SSO) access to Aiven. | ||
<!-- vale on --> | ||
|
||
## Prerequisite steps in Aiven Console | ||
Use [FusionAuth](https://fusionauth.io/) to give your organization users single sign-on (SSO) access to Aiven. | ||
|
||
Add FusionAuth as a SAML | ||
[identity provider](/docs/platform/howto/saml/add-identity-providers#add-idp-aiven-console) in the Console. | ||
<IdPStep1/> | ||
|
||
## Configure SAML on FusionAuth {#configure-saml-fusionauth} | ||
## Step 2: Configure SAML on FusionAuth | ||
|
||
The setup on FusionAuth has three parts: | ||
|
||
- create an API key | ||
- generate a custom RSA certificate | ||
- create an application | ||
- Create an API key | ||
- Generate a custom RSA certificate | ||
- Create an application | ||
|
||
Create an API Key in your FusionAuth instance: | ||
### Create an API key | ||
|
||
1. In FusionAuth, go to **Settings** > **API Keys**. | ||
1. Click the **Add** icon. | ||
1. Enter a description for the key. Example: `Certificate generator`. | ||
1. In the **Endpoints** list, find `/api/key/import`. | ||
1. Enter a description for the key. | ||
1. In the **Endpoints** list, find **/api/key/import**. | ||
1. Toggle on **POST**. | ||
1. Click the **Save** icon. | ||
|
||
![Creating API Key.](/images/content/platform/howto/saml/fusionauth/create-api-key.png) | ||
![Creating an API key.](/images/content/platform/howto/saml/fusionauth/create-api-key.png) | ||
|
||
1. On the **API Keys** page, find your new key and click the value | ||
in the **Key** column. | ||
1. On the **API Keys** page, find your key and click the value in the **Key** column. | ||
|
||
1. Copy the whole key. You'll use this for the script. | ||
|
||
![Grabbing API Key.](/images/content/platform/howto/saml/fusionauth/grab-api-key.png) | ||
![Copying the API key value.](/images/content/platform/howto/saml/fusionauth/grab-api-key.png) | ||
|
||
1. Clone [the FusionAuth example scripts GitHub | ||
repository](https://github.com/FusionAuth/fusionauth-example-scripts). | ||
1. To clone the [FusionAuth example scripts GitHub | ||
repository](https://github.com/FusionAuth/fusionauth-example-scripts), run: | ||
|
||
```shell | ||
git clone [email protected]:FusionAuth/fusionauth-example-scripts.git | ||
|
@@ -50,33 +51,31 @@ Create an API Key in your FusionAuth instance: | |
./generate-certificate | ||
``` | ||
|
||
1. Give the key a meaningful name (for example, "Aiven key"). | ||
1. Name the key. | ||
|
||
1. Copy the generated certificate created by the script. | ||
|
||
1. Copy the generated certificate that the script creates. You now have | ||
a certificate in the **Key Master** in your FusionAuth instance. | ||
You now have a certificate in the **Key Master** in your FusionAuth instance. | ||
|
||
Create an application in your FusionAuth instance: | ||
### Create an application | ||
|
||
1. In **Applications**, click the **Add** icon. | ||
1. Enter a name for the application (for example, "Aiven"). | ||
1. On the **SAML** tab, and toggle on the **Enabled** switch. | ||
1. Paste the **Metadata URL** and **ACS URL** you copied from the Aiven | ||
Console to the **Issuer** and **Authorized redirect URLs** fields in | ||
your FusionAuth application, respectively. | ||
|
||
| Aiven | FusionAuth | | ||
| ------------ | ------------------------ | | ||
| Metadata URL | Issuer | | ||
| ACS URL | Authorized redirect URLs | | ||
|
||
1. In the **Authentication response** section, change the **Signing | ||
key** to the API key you created. | ||
1. Click the **Save** icon to save your application. | ||
1. Enter a name for the application. | ||
1. On the **SAML** tab, toggle on **Enabled**. | ||
1. In the **Issuer** field, enter the **Metadata URL** from the Aiven Console. | ||
1. In the **Authorized redirect URLs** field, enter the **ACS URL** from the Aiven Console. | ||
1. In the **Authentication response** section, change the **Signing key** to the | ||
API key you created. | ||
1. Click the **Save** icon. | ||
1. On the **Applications** page, click the magnifying glass. | ||
1. In the **SAML v2 Integration details** section, copy the **Entity | ||
Id** and **Login URL**. | ||
1. In the **SAML v2 Integration details** section, | ||
copy the **Entity Id** and **Login URL**. | ||
|
||
## Step 3: Finish the configuration in Aiven | ||
|
||
## Finish the configuration in Aiven | ||
Go back to the Aiven Console to complete setting up the IdP. If you saved your IdP as a | ||
draft, you can open the settings by clicking the name of the IdP. | ||
|
||
Go back to the Aiven Console to | ||
[configure the IdP](/docs/platform/howto/saml/add-identity-providers#configure-idp-aiven-console) and complete the setup. | ||
1. In the **IDP URL** field, enter the **Login URL** from FusionAuth. | ||
1. In the **Entity ID** field, enter the **Entity ID** from FusionAuth. | ||
<IdPStep3/> |
Oops, something went wrong.