简体   繁体   English

AWS SSO/AWS Opensearch SAML 集成

[英]AWS SSO/AWS Opensearch SAML integration

I have an implementation of AWS OpenSearch that I can access using a master password/user combination.我有一个 AWS OpenSearch 的实现,我可以使用主密码/用户组合访问它。

Our AWS implementation uses AWS SSO to access accounts via the console.我们的 AWS 实施使用 AWS SSO 通过控制台访问帐户。 I have configured a custom SAML 2.0 application in AWS SSO and enabled SAML in OpenSearch.我在 AWS SSO 中配置了自定义 SAML 2.0 应用程序并在 OpenSearch 中启用了 SAML。

  • Service provider entity ID (OS) copied and mapped to Application ACS URL (AWS SSO)服务提供商实体 ID (OS) 已复制并映射到应用程序 ACS URL (AWS SSO)
  • IdP-initiated SSO URL (OS) copied and mapped to Application SAML audience (SSO) IdP 发起的 SSO URL (OS) 复制并映射到应用程序 SAML 受众 (SSO)
  • AWS SSO SAML metadata file downloaded (SSO) and imported as IdP metadata (OS). AWS SSO SAML 元数据文件已下载 (SSO) 并作为 IdP 元数据 (OS) 导入。

Attribute mapping is as below属性映射如下

属性映射

I have assigned myself as a user (SSO) and used the same email as SAML master username (OS).我已将自己指定为用户 (SSO),并使用相同的 email 作为 SAML 主用户名 (OS)。

I am getting the following error when I click on the custom web application icon in AWS当我在 AWS 中单击自定义 web 应用程序图标时出现以下错误

{"statusCode":500,"error":"Internal Server Error","message":"Internal Error"}

What is incorrectly configured in this set up?此设置中有什么配置不正确?

The correct configuration would be:正确的配置是:

Application ACS URL: either the IdP-initiated SSO URL[1] or SP-initiated SSO URL[2]应用程序 ACS URL:IdP 发起的 SSO URL[1] 或 SP 发起的 SSO URL[2]

Application SAML audience: the Service provider entity ID应用程序 SAML 受众:服务提供商实体 ID

Using [1] you would need to access the user portal of the SSO and the OpenSearch application will be there.使用 [1] 您将需要访问 SSO 的用户门户,OpenSearch 应用程序将在那里。 Using [2] you can access the dashboard URL directly.使用 [2] 您可以直接访问仪表板 URL。

Also, you might find useful to map an SSO Group to an OpenSearch role (as opposed to a single user).此外,您可能会发现 map 对 OpenSearch 角色(与单个用户相对)的 SSO 组很有用。 To do that, add a new attribute mapping on the SSO Application.为此,请在 SSO 应用程序上添加一个新的属性映射。

"User attribute in the application" -> Groups
"Maps to this string value or user attribute in AWS SSO" -> "${user:groups}"

Then you will need to edit your OpenSearch SAML configuration and add: In "Roles key - optional" Specify the attribute of SAML to "Groups"然后您需要编辑您的 OpenSearch SAML 配置并添加:在“Roles key - optional”中将 SAML 的属性指定为“Groups”

After that, copy the ID of the Group, log in to your opensearch dashboard (with a master user) and map this ID to a Role as a "backend role".之后,复制组的 ID,登录到您的 opensearch 仪表板(使用主用户)并将此 ID map 作为“后端角色”的角色。

I had the same problem, i figured out that my AD metadata was wrong.我有同样的问题,我发现我的 AD 元数据是错误的。 Verify that you used the good metadata xml file确认您使用了良好的元数据 xml 文件

声明:本站的技术帖子网页,遵循CC BY-SA 4.0协议,如果您需要转载,请注明本站网址或者原文地址。任何问题请咨询:yoyou2525@163.com.

 
粤ICP备18138465号  © 2020-2024 STACKOOM.COM