Hello Community,
I faced an issue with the SAML configuration when certificates are provided for Request signing. Version: Opendistro 1.12.0 Provider: PingID These are the configurations:
On the Identity Provider side I configured this SLO: https://<kibana_ip>/auth/logout and provided the .pem certificate.
On the kibana.yml file I’ve configured this:
@Lord_Zetas thanks for that info. Have you tried 1.13?
I had couple issues with 1.11 and 1.12 in regards to self-signed certs and openid. Maybe SAML got affected too.
Have you got any warnings/errors in Kibana/ES logs?
Pablo, thanks for the Help.
I did not tried with that version yet.
In kibana I don’t see warnings or errors, just the action being logged in.
In Elastic I have only this warning: [2021-04-15T16:45:20,608][WARN ][c.a.o.s.h.HTTPBasicAuthenticator] [node-1] No 'Basic Authorization' header, send 401 and 'WWW-Authenticate Basic'
Thanks in advance!
Hello Pablo,
I am confirming that I ran into the same issue with OpenDistro 1.13: {"statusCode":401,"error":"Unauthorized","message":"Unauthorized"}
Do you think I should raise an issue in github?
Hello Pablo,
No, I have configured port 443 in kibana.yml and I applied this config to the server: setcap 'cap_net_bind_service=+ep' /usr/share/kibana/node/bin/node
So, I can access it directly to 443 port through HTTPS.
I managed to get a workaround for this issue. The problem seems to be that the parameter authInfo.sso_logout_url comes with the SLO URL and it is taken as unauthorized (in my case and with Ping Identity IdP is in the form https://auth.pingone.com/<tenant>/saml20/idp/slo ).
So I changed the redirect URL that is injected on the location of the response header.
Edit the file /usr/share/kibana/plugins/opendistroSecurityKibana/server/auth/types/saml/routes.js
I just want to say thanks, I have a instance for Wazuh-v4.5 and Opensearch-v2.11.0 using SAML
and was unable to logoff without getting a 404 " Not found" in either one of those. I’m using Zitadel for my idp.
vi /usr/share/opensearch-dashboards/plugins/securityDashboards/server/auth/types/saml/routes.js