Configuring a connection with SAML
SAML (Security Assertion Markup Language) lets you set up seamless and secure single sign-on (SSO) for your organization.
This means you can link your organization in the CIAM to an identity provider, so that your users do not need to log in every time they want to use Centreon Cloud.
Prerequisites​
In your identity provider:
- Create an application.
- Create application roles, which will be mapped to CIAM roles: User, Editor and Administrator.
- You must then assign users to the application and assign them each a role.
If you already have users in the CIAM, the user's role in the IdP will overwrite their current role in the CIAM, except for Administrators in the CIAM, whose role does not change. This is not to lose access to your organization by mistake.
Step 1: Access the configuration page​
You must have the Administrator role in the CIAM to be able to configure SAML for an organization.
- Log in to the CIAM.
- If you belong to several organizations, select the one you want from the list at the top left of the page.
- Go to Organization > Authentication.
Step 2: Configure the connection to your identity provider​
Before you activate SAML authentication, you need to fill in all necessary parameters, then test your connection. Activating SAML will only be possible if your configuration is valid.
-
Fill in the Domain name for your company: only users whose email match this domain name will be able to connect using the identity provider.
-
Copy the contents of the 2 following fields from the Identity provider section of the CIAM page to the corresponding fields in your identity provider:
- Identifier (Entity ID): enter the URL representing the unique name for the SAML entity.
- Reply URL (Assertion consumer service URL): for example,
https:/<Centreon_IP_address>/centreon/api/latest/saml/acs
.
Once you have filled in these fields in the identity provider, the identity provider gives you the values to be copied below (all of them appear in the application's metadata).
-
Fill in the following fields:
- Sign in URL: define the identity provider's login URL to identify users (mandatory).
- Certificate: copy and paste the x509 certificate of the identity provider (mandatory).
- User ID (email) attribute for Centreon user: define which of the variables returned by the identity provider must be used to authenticate users. It should be prefixed by the namespace URL, which you can find in your identity provider's application configuration. For example, http://schemas.xmlsoap.org/ws/2005/05/identity/claims/email. (Mandatory.)
- Sign out URL: when users log out from Centreon, they will be redirected to this URL. This means you can make them log out from the identity provider too.
-
Role mapping:
-
Role attribute path: Retrieve this value from your application's metadata. Example:
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/role
. -
Create the mappings you want. There are 3 roles in the CIAM (User, Editor and Administrator) which can be mapped to roles you have created in your identity provider (a CIAM role can be mapped to one, several, or none of your IdP roles). In the Attribute value field, enter the exact value that you have defined for each role in your identity provider (the value, not the display name). Users who log in to Centreon will be automatically granted rights on menus and actions, as they will be given a role according to the rules you have defined.
It is possible not to define a role mapping. This is for test purposes only. In this case, users will need to be invited manually in the CIAM before they can join your organization using SSO.
-
-
Group mapping:
- Group attribute path: Retrieve this value from your application's metadata.
- Using the lists below, match the correct attribute values with the CIAM user groups you want. This will determine which rights users will have on resources.
Step 3: Test the connection and activate SAML​
To avoid any configuration errors, you must test the connection before you can activate it. You will be redirected to your IdP: enter valid credentials to perform the test. During the test, role mapping is also verified, but if it fails, the connection can still be activated.
- In the Activation section, click Test. A window opens, with the results of the test.
- Once the test has succeeded, activate the Enable Saml v2 Connection option. Your users can now log in via their identity provider.