File tree 2 files changed +4
-4
lines changed
2 files changed +4
-4
lines changed Original file line number Diff line number Diff line change @@ -56,7 +56,7 @@ testClusters.integTest {
56
56
setting ' xpack.security.authc.realms.pki.pki1.certificate_authorities' , ' [ "testClient.crt" ]'
57
57
setting ' xpack.security.authc.realms.pki.pki1.delegation.enabled' , ' true'
58
58
setting ' xpack.security.authc.realms.saml.saml1.order' , ' 4'
59
- setting ' xpack.security.authc.realms.saml.saml1.sp.logout' , ' https://kibana.example.com /logout'
59
+ setting ' xpack.security.authc.realms.saml.saml1.sp.logout' , ' https://kibana.org /logout'
60
60
setting ' xpack.security.authc.realms.saml.saml1.idp.entity_id' , ' https://my-idp.org'
61
61
setting ' xpack.security.authc.realms.saml.saml1.idp.metadata.path' , ' idp-docs-metadata.xml'
62
62
setting ' xpack.security.authc.realms.saml.saml1.sp.entity_id' , ' https://kibana.org'
Original file line number Diff line number Diff line change @@ -15,7 +15,7 @@ Generate SAML metadata for a SAML 2.0 Service Provider.
15
15
The SAML 2.0 specification provides a mechanism for Service Providers to
16
16
describe their capabilities and configuration using a metadata file. This API
17
17
generates Service Provider metadata, based on the configuration of a SAML realm
18
- in Elasticsearch .
18
+ in {es} .
19
19
20
20
[[security-api-saml-sp-metadata-path-params]]
21
21
==== {api-path-parms-title}
@@ -39,11 +39,11 @@ SAML realm `saml1`:
39
39
--------------------------------------------------
40
40
GET /_security/saml/metadata/saml1
41
41
--------------------------------------------------
42
- The API returns the following response:
42
+ The API returns the following response containing the SAML metadata as an XML string :
43
43
44
44
[source,console-result]
45
45
--------------------------------------------------
46
46
{
47
- "metadata" : "<?xml version=\"1.0\" encoding=\"UTF-8\"?><md:EntityDescriptor xmlns:md=\"urn:oasis:names:tc:SAML:2.0:metadata\" entityID=\"https://kibana.org\"><md:SPSSODescriptor AuthnRequestsSigned=\"false\" WantAssertionsSigned=\"true\" protocolSupportEnumeration=\"urn:oasis:names:tc:SAML:2.0:protocol\"><md:SingleLogoutService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\" Location=\"https://kibana.example.com /logout\"/><md:AssertionConsumerService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\" Location=\"https://kibana.org/api/security/saml/callback\" index=\"1\" isDefault=\"true\"/></md:SPSSODescriptor></md:EntityDescriptor>"
47
+ "metadata" : "<?xml version=\"1.0\" encoding=\"UTF-8\"?><md:EntityDescriptor xmlns:md=\"urn:oasis:names:tc:SAML:2.0:metadata\" entityID=\"https://kibana.org\"><md:SPSSODescriptor AuthnRequestsSigned=\"false\" WantAssertionsSigned=\"true\" protocolSupportEnumeration=\"urn:oasis:names:tc:SAML:2.0:protocol\"><md:SingleLogoutService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\" Location=\"https://kibana.org /logout\"/><md:AssertionConsumerService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\" Location=\"https://kibana.org/api/security/saml/callback\" index=\"1\" isDefault=\"true\"/></md:SPSSODescriptor></md:EntityDescriptor>"
48
48
}
49
49
--------------------------------------------------
You can’t perform that action at this time.
0 commit comments