Skip to content

Commit fcc9772

Browse files
committed
OIDC and SAML admonitions separated
1 parent 1cd9607 commit fcc9772

File tree

4 files changed

+20
-15
lines changed

4 files changed

+20
-15
lines changed

deploy-manage/users-roles/_snippets/azure-group-overage.md

Lines changed: 0 additions & 9 deletions
This file was deleted.

deploy-manage/users-roles/cluster-or-deployment-auth/oidc-examples.md

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -99,8 +99,15 @@ For more information about OpenID connect in Azure, refer to [Azure OAuth 2.0 an
9999
* `KIBANA_ENDPOINT_URL` is your {{kib}} endpoint.
100100
* `YOUR_DOMAIN` and `TLD` in the `claim_patterns.principal` regular expression are your organization email domain and top level domain.
101101

102-
::::{include} ../_snippets/azure-group-overage.md
103-
::::
102+
:::{admonition} For organizations with many group memberships
103+
If you configure [`claims.groups`](/deploy-manage/users-roles/cluster-or-deployment-auth/openid-connect.md#oidc-user-properties) to read the list of Azure AD groups from the ID token, be aware that users who belong to many groups may exceed Azure AD’s token size limit. In that case, the `groups` claim will be omitted.
104+
105+
To avoid this, enable the **Groups assigned to the application** option in Azure Entra (**App registrations > Token configuration > Edit groups claim**). This setting limits the `groups` claim to only those assigned to the application.
106+
107+
**Alternative:** If you can’t restrict groups to app-assigned ones, use the [Microsoft Graph Authz plugin for Elasticsearch](elasticsearch://reference/elasticsearch-plugins/ms-graph-authz.md). It looks up group memberships through Microsoft Graph during authorization, so it continues to work even when the `groups` claim is omitted due to overage.
108+
109+
Refer to [Group overages](https://learn.microsoft.com/en-us/security/zero-trust/develop/configure-tokens-group-claims-app-roles#group-overages) for more information.
110+
:::
104111

105112
If you're using {{ece}} or {{ech}}, and you're using machine learning or a deployment with hot-warm architecture, you must include this configuration in the user settings section for each node type.
106113

deploy-manage/users-roles/cluster-or-deployment-auth/saml-entra.md

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -91,8 +91,15 @@ Follow these steps to configure SAML with Microsoft Entra ID as an identity prov
9191

9292
* For `idp.metadata.path`, we’ve shown the format to construct the URL. This value should be identical to the `App Federation Metadata URL` setting that you made a note of in the previous step.
9393

94-
::::{include} ../_snippets/azure-group-overage.md
95-
::::
94+
:::{admonition} For organizations with many group memberships
95+
If you configure [`attributes.groups`](/deploy-manage/users-roles/cluster-or-deployment-auth/saml.md#saml-es-user-properties) to read the list of Azure AD groups from the SAML assertion, be aware that users who belong to many groups may exceed Azure AD’s size limit for SAML tokens. In that case, the `groups` attribute will be omitted.
96+
97+
To avoid this, enable the **Groups assigned to the application** option in Azure Entra (**Enterprise applications > Single sign-on > Attributes & Claims > Edit**). This setting limits the `groups` attribute in the SAML assertion to only those groups assigned to the application.
98+
99+
**Alternative:** If you can’t restrict groups to app-assigned ones, use the [Microsoft Graph Authz plugin for Elasticsearch](elasticsearch://reference/elasticsearch-plugins/ms-graph-authz.md). It looks up group memberships through Microsoft Graph during authorization, so it continues to work even when the `groups` attribute is omitted due to overage.
100+
101+
Refer to [Group overages](https://learn.microsoft.com/en-us/security/zero-trust/develop/configure-tokens-group-claims-app-roles#group-overages) in the Microsoft Security documentation for more information.
102+
:::
96103

97104
If you're using {{ece}} or {{ech}}, and you're using machine learning or a deployment with hot-warm architecture, you must include this configuration in the user settings section for each node type.
98105

deploy-manage/users-roles/cluster-or-deployment-auth/saml.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -269,10 +269,10 @@ groups
269269
::::
270270

271271
name
272-
: *(Optional)* The user’s full name.
272+
: *(Optional)* The user’s full name. It will be used in {{kib}}'s profile page to display user details.
273273

274274
mail
275-
: *(Optional)* The user’s email address.
275+
: *(Optional)* The user’s email address. It will be used in {{kib}}'s profile page to display user details.
276276

277277
dn
278278
: *(Optional)* The user’s X.500 *Distinguished Name*.

0 commit comments

Comments
 (0)