You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Section about the case where the `principal` user property can't
be mapped.
- Section about when the IdP SAML metadata do not contain a
SingleSignOnService that supports HTTP-Redirect binding.
Co-Authored-By: Lisa Cawley <[email protected]>
Co-Authored-By: Tim Vernum <[email protected]>
This configuration means that {es} expects to find a SAML Attribute with the name `AttributeName0` or a `NameID` with the appropriate format in the SAML
574
+
response so that <<saml-attribute-mapping,it can map it>> to the `principal` user property. The `principal` user property is a
575
+
mandatory one, so if this mapping can't happen, the authentication fails.
576
+
577
+
If you are attempting to map a `NameID`, make sure that the expected `NameID` format matches the one that is sent.
578
+
See <<saml-attribute-mapping-nameid>> for more details.
579
+
580
+
If you are attempting to map a SAML attribute and it is not part of the list in the error message, it might mean
581
+
that you have misspelled the attribute name, or that the IdP is not sending this particular attribute. You might
582
+
be able to use another attribute from the list to map to `principal` or consult with your IdP administrator to
583
+
determine if the required attribute can be sent.
584
+
585
+
--
586
+
587
+
. *Symptoms:*
588
+
+
589
+
--
590
+
Authentication in {kib} fails and the following error is printed in the {es}
591
+
logs:
592
+
593
+
....
594
+
Cannot find [{urn:oasis:names:tc:SAML:2.0:metadata}IDPSSODescriptor]/[urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect] in descriptor
595
+
....
596
+
597
+
*Resolution:*
598
+
599
+
This error indicates that the SAML metadata for your Identity Provider do not contain a `<SingleSignOnService>` endpoint with binding of
600
+
HTTP-Redirect (urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect). {es} supports only the `HTTP-Redirect` binding for SAML authentication
601
+
requests (and it doesn't support the `HTTP-POST` binding). Consult your IdP administrator in order to enable at least one
602
+
`<SingleSignOnService>` supporting `HTTP-Redirect` binding and update your IdP SAML Metadata.
0 commit comments