Just a question, we are using kibana without https inside the server because we only access kibana behind a reverse proxy, and the reverse proxy is secure with https. Do we need to use kibana with https inside server to work with SAML?
In your config.yml I’ve found that you use metadata_url with keycloak’s HTTPS address. According to documentation, you’ll have to add the following to your config.yml to make it work.
enable_ssl: true
verify_hostnames: true
pemtrustedcas_filepath: "path to keycloak certificate"
Alternatively, you could download the metadata XML file from keycloak
and use metadata_file in config.yml. Then you won’t need to add
enable_ssl: true
verify_hostnames: true
pemtrustedcas_filepath: "path to keycloak certificate"
Please also remember that exchange_key must have at least 32 characters.
Does sp: entity_id correspond with SAML ClientID in Keycloak?