From 08e6713f3d01d11b690f5be0109e2508469350d9 Mon Sep 17 00:00:00 2001 From: Marci W <333176+marciw@users.noreply.github.com> Date: Mon, 17 Feb 2025 10:28:32 -0500 Subject: [PATCH] Move TS SSO content --- .../configure-saml-authentication.md | 24 ++--------------- troubleshoot/deployments/elastic-cloud/sso.md | 27 +++++++++++++++++++ troubleshoot/toc.yml | 1 + 3 files changed, 30 insertions(+), 22 deletions(-) create mode 100644 troubleshoot/deployments/elastic-cloud/sso.md diff --git a/deploy-manage/users-roles/cloud-organization/configure-saml-authentication.md b/deploy-manage/users-roles/cloud-organization/configure-saml-authentication.md index a15b3eaf3b..da931141aa 100644 --- a/deploy-manage/users-roles/cloud-organization/configure-saml-authentication.md +++ b/deploy-manage/users-roles/cloud-organization/configure-saml-authentication.md @@ -226,25 +226,5 @@ If SSO enforcement is enabled, then you must disable SSO enforcement before you 2. In the **User authentication** section, click **Edit**. 3. Click **Disable SAML SSO**. - -## Troubleshoot SSO [ec_troubleshoot_sso] - - -### SSO screen is not redirecting to my IdP [ec_sso_screen_is_not_redirecting_to_my_idp] - -Double check the `saml_idp.sso_url` provided during IdP registration. This should be the HTTP-POST binding URL to your IdP’s SAML application. {{ecloud}} will redirect to this URL during sign in. - - -### Failure to redirect back to {{ecloud}} after IdP log in, or redirected to `/access-denied` [ec_failure_to_redirect_back_to_ecloud_after_idp_log_in_or_redirected_to_access_denied] - -There could be a variety of issues that might result in sign in failure. Try tracing the SAML request and response with a SAML tracer. You should see a `SAMLRequest` field when redirecting to your IdP, and a `SAMLResponse` field when redirecting to the Cloud ACS. - -If there was an error in your IdP, there may be a non-success `Status` field which should describe the error that occurred. - -If the SAML response was successful, double-check the components of the SAML response: - -* The `Destination` and `Recipient` should match the `acs` provided by the {{ecloud}} IdP registration API. -* An `AttributeStatement` named `email` should be sent with the email matching a domain claimed by your {{ecloud}} organization. If the domain of the email doesn’t match a claimed domain, the authentication flow will not complete. -* The `AudienceRestriction` `Audience` should match the `sp_entity_id` provided by the {{ecloud}} IdP registration API. -* The `Issuer` should match the value provided to the {{ecloud}} IdP registration API. -* The signature of the SAML response should be verifiable by the certificate provided during IdP configuration in Cloud. +## Resources +[](/troubleshoot/deployments/elastic-cloud/sso.md) \ No newline at end of file diff --git a/troubleshoot/deployments/elastic-cloud/sso.md b/troubleshoot/deployments/elastic-cloud/sso.md new file mode 100644 index 0000000000..cee4bab356 --- /dev/null +++ b/troubleshoot/deployments/elastic-cloud/sso.md @@ -0,0 +1,27 @@ +--- +navigation_title: "SAML single sign-on (SSO)" +mapped_pages: + - https://www.elastic.co/guide/en/cloud/current/ec-saml-sso.html +--- + +# Troubleshoot {{ecloud}} SSO [ec_troubleshoot_sso] + + +## SSO screen is not redirecting to my IdP [ec_sso_screen_is_not_redirecting_to_my_idp] + +Double check the `saml_idp.sso_url` provided during IdP registration. This should be the HTTP-POST binding URL to your IdP’s SAML application. {{ecloud}} will redirect to this URL during sign in. + + +## Failure to redirect back to {{ecloud}} after IdP log in, or redirected to `/access-denied` [ec_failure_to_redirect_back_to_ecloud_after_idp_log_in_or_redirected_to_access_denied] + +There could be a variety of issues that might result in sign in failure. Try tracing the SAML request and response with a SAML tracer. You should see a `SAMLRequest` field when redirecting to your IdP, and a `SAMLResponse` field when redirecting to the Cloud ACS. + +If there was an error in your IdP, there may be a non-success `Status` field which should describe the error that occurred. + +If the SAML response was successful, double-check the components of the SAML response: + +* The `Destination` and `Recipient` should match the `acs` provided by the {{ecloud}} IdP registration API. +* An `AttributeStatement` named `email` should be sent with the email matching a domain claimed by your {{ecloud}} organization. If the domain of the email doesn’t match a claimed domain, the authentication flow will not complete. +* The `AudienceRestriction` `Audience` should match the `sp_entity_id` provided by the {{ecloud}} IdP registration API. +* The `Issuer` should match the value provided to the {{ecloud}} IdP registration API. +* The signature of the SAML response should be verifiable by the certificate provided during IdP configuration in Cloud. diff --git a/troubleshoot/toc.yml b/troubleshoot/toc.yml index 896108982b..8486fbb8ff 100644 --- a/troubleshoot/toc.yml +++ b/troubleshoot/toc.yml @@ -116,6 +116,7 @@ toc: - file: deployments/serverless.md - file: deployments/elastic-cloud.md children: + - file: deployments/elastic-cloud/sso.md - file: deployments/elastic-cloud/monitoring.md - file: deployments/cloud-enterprise/cloud-enterprise.md children: