Skip to content

Commit 08e6713

Browse files
committed
Move TS SSO content
1 parent 8abc8fe commit 08e6713

File tree

3 files changed

+30
-22
lines changed

3 files changed

+30
-22
lines changed

deploy-manage/users-roles/cloud-organization/configure-saml-authentication.md

Lines changed: 2 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -226,25 +226,5 @@ If SSO enforcement is enabled, then you must disable SSO enforcement before you
226226
2. In the **User authentication** section, click **Edit**.
227227
3. Click **Disable SAML SSO**.
228228

229-
230-
## Troubleshoot SSO [ec_troubleshoot_sso]
231-
232-
233-
### SSO screen is not redirecting to my IdP [ec_sso_screen_is_not_redirecting_to_my_idp]
234-
235-
Double check the `saml_idp.sso_url` provided during IdP registration. This should be the HTTP-POST binding URL to your IdP’s SAML application. {{ecloud}} will redirect to this URL during sign in.
236-
237-
238-
### Failure to redirect back to {{ecloud}} after IdP log in, or redirected to `/access-denied` [ec_failure_to_redirect_back_to_ecloud_after_idp_log_in_or_redirected_to_access_denied]
239-
240-
There could be a variety of issues that might result in sign in failure. Try tracing the SAML request and response with a SAML tracer. You should see a `SAMLRequest` field when redirecting to your IdP, and a `SAMLResponse` field when redirecting to the Cloud ACS.
241-
242-
If there was an error in your IdP, there may be a non-success `Status` field which should describe the error that occurred.
243-
244-
If the SAML response was successful, double-check the components of the SAML response:
245-
246-
* The `Destination` and `Recipient` should match the `acs` provided by the {{ecloud}} IdP registration API.
247-
* An `AttributeStatement` named `email` should be sent with the email matching a domain claimed by your {{ecloud}} organization. If the domain of the email doesn’t match a claimed domain, the authentication flow will not complete.
248-
* The `AudienceRestriction` `Audience` should match the `sp_entity_id` provided by the {{ecloud}} IdP registration API.
249-
* The `Issuer` should match the value provided to the {{ecloud}} IdP registration API.
250-
* The signature of the SAML response should be verifiable by the certificate provided during IdP configuration in Cloud.
229+
## Resources
230+
[](/troubleshoot/deployments/elastic-cloud/sso.md)
Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
---
2+
navigation_title: "SAML single sign-on (SSO)"
3+
mapped_pages:
4+
- https://www.elastic.co/guide/en/cloud/current/ec-saml-sso.html
5+
---
6+
7+
# Troubleshoot {{ecloud}} SSO [ec_troubleshoot_sso]
8+
9+
10+
## SSO screen is not redirecting to my IdP [ec_sso_screen_is_not_redirecting_to_my_idp]
11+
12+
Double check the `saml_idp.sso_url` provided during IdP registration. This should be the HTTP-POST binding URL to your IdP’s SAML application. {{ecloud}} will redirect to this URL during sign in.
13+
14+
15+
## Failure to redirect back to {{ecloud}} after IdP log in, or redirected to `/access-denied` [ec_failure_to_redirect_back_to_ecloud_after_idp_log_in_or_redirected_to_access_denied]
16+
17+
There could be a variety of issues that might result in sign in failure. Try tracing the SAML request and response with a SAML tracer. You should see a `SAMLRequest` field when redirecting to your IdP, and a `SAMLResponse` field when redirecting to the Cloud ACS.
18+
19+
If there was an error in your IdP, there may be a non-success `Status` field which should describe the error that occurred.
20+
21+
If the SAML response was successful, double-check the components of the SAML response:
22+
23+
* The `Destination` and `Recipient` should match the `acs` provided by the {{ecloud}} IdP registration API.
24+
* An `AttributeStatement` named `email` should be sent with the email matching a domain claimed by your {{ecloud}} organization. If the domain of the email doesn’t match a claimed domain, the authentication flow will not complete.
25+
* The `AudienceRestriction` `Audience` should match the `sp_entity_id` provided by the {{ecloud}} IdP registration API.
26+
* The `Issuer` should match the value provided to the {{ecloud}} IdP registration API.
27+
* The signature of the SAML response should be verifiable by the certificate provided during IdP configuration in Cloud.

troubleshoot/toc.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -116,6 +116,7 @@ toc:
116116
- file: deployments/serverless.md
117117
- file: deployments/elastic-cloud.md
118118
children:
119+
- file: deployments/elastic-cloud/sso.md
119120
- file: deployments/elastic-cloud/monitoring.md
120121
- file: deployments/cloud-enterprise/cloud-enterprise.md
121122
children:

0 commit comments

Comments
 (0)