Skip to content

Commit af59a67

Browse files
jkakavaslcawltvernum
authored
Add sections in SAML Troubleshooting (#47964)
- Section about the case where the `principal` user property can't be mapped. - Section about when the IdP SAML metadata do not contain a SingleSignOnService that supports HTTP-Redirect binding. Co-Authored-By: Lisa Cawley <[email protected]> Co-Authored-By: Tim Vernum <[email protected]>
1 parent f0e3711 commit af59a67

File tree

2 files changed

+52
-0
lines changed

2 files changed

+52
-0
lines changed

x-pack/docs/en/security/authentication/saml-guide.asciidoc

+1
Original file line numberDiff line numberDiff line change
@@ -240,6 +240,7 @@ The recommended steps for configuring these SAML attributes are as follows:
240240
in your IdP. In the example above, we have configured the `principal` and
241241
`groups` attributes.
242242

243+
[[saml-attribute-mapping-nameid]]
243244
===== Special attribute names
244245

245246
In general, {es} expects that the configured value for an attribute will be a

x-pack/docs/en/security/troubleshooting.asciidoc

+51
Original file line numberDiff line numberDiff line change
@@ -551,6 +551,57 @@ placeholder is used instead. To diagnose the _actual_ problem, you must check
551551
the {es} logs for further details.
552552
--
553553

554+
. *Symptoms:*
555+
+
556+
--
557+
Authentication in {kib} fails and the following error is printed in the {es}
558+
logs:
559+
560+
....
561+
Authentication to realm <saml-realm-name> failed - SAML Attribute [<AttributeName0>] for
562+
[xpack.security.authc.realms.saml.<saml-realm-name>.attributes.principal] not found in saml attributes
563+
[<AttributeName1>=<AttributeValue1>, <AttributeName2>=<AttributeValue2>, ...] or NameID [ NameID(format)=value ]
564+
....
565+
566+
*Resolution:*
567+
568+
This error indicates that {es} failed to find the necessary SAML attribute in the SAML response that the
569+
Identity Provider sent. In this example, {es} is configured as follows:
570+
....
571+
xpack.security.authc.realms.saml.<saml-realm-name>.attributes.principal: AttributeName0
572+
....
573+
This configuration means that {es} expects to find a SAML Attribute with the name `AttributeName0` or a `NameID` with the appropriate format in the SAML
574+
response so that <<saml-attribute-mapping,it can map it>> to the `principal` user property. The `principal` user property is a
575+
mandatory one, so if this mapping can't happen, the authentication fails.
576+
577+
If you are attempting to map a `NameID`, make sure that the expected `NameID` format matches the one that is sent.
578+
See <<saml-attribute-mapping-nameid>> for more details.
579+
580+
If you are attempting to map a SAML attribute and it is not part of the list in the error message, it might mean
581+
that you have misspelled the attribute name, or that the IdP is not sending this particular attribute. You might
582+
be able to use another attribute from the list to map to `principal` or consult with your IdP administrator to
583+
determine if the required attribute can be sent.
584+
585+
--
586+
587+
. *Symptoms:*
588+
+
589+
--
590+
Authentication in {kib} fails and the following error is printed in the {es}
591+
logs:
592+
593+
....
594+
Cannot find [{urn:oasis:names:tc:SAML:2.0:metadata}IDPSSODescriptor]/[urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect] in descriptor
595+
....
596+
597+
*Resolution:*
598+
599+
This error indicates that the SAML metadata for your Identity Provider do not contain a `<SingleSignOnService>` endpoint with binding of
600+
HTTP-Redirect (urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect). {es} supports only the `HTTP-Redirect` binding for SAML authentication
601+
requests (and it doesn't support the `HTTP-POST` binding). Consult your IdP administrator in order to enable at least one
602+
`<SingleSignOnService>` supporting `HTTP-Redirect` binding and update your IdP SAML Metadata.
603+
--
604+
554605
. *Symptoms:*
555606
+
556607
--

0 commit comments

Comments
 (0)