Skip to content

Conversation

@eedugon
Copy link
Contributor

@eedugon eedugon commented Oct 16, 2025

A user shared some interesting suggestions in https://github.com/elastic/platform-docs-team/issues/553 (internal issue)

I've addressed two of them in this PR:

  • Added extra details of the usefulness of claims.name and claims.mail.
  • Added a tip for companies with large group memberships in Azure.

The following hasn't been included as I'm not sure where we could put this information, although it looks interesting also:

Debugging Best Practices:
Use Azure CLI to get an ID Token: az account get-access-token --query "accessToken" --output tsv
Decode the token and investigate the payload. The payload contains all the data that is relevant when logging in, e.g. the email as the principle id.

I haven't found a dedicated troubleshooting doc for security realms.

@jkakavas , would you review if the addings here are technically accurate and make sense to be added to the docs? or let us know if we should ping someone else to review this small change.

Closes https://github.com/elastic/platform-docs-team/issues/553 (internal issue)

@eedugon eedugon requested a review from a team as a code owner October 16, 2025 09:16
@eedugon eedugon requested a review from jkakavas October 16, 2025 09:20
Copy link
Collaborator

@shainaraskas shainaraskas left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

couple small edits for ya

@eedugon
Copy link
Contributor Author

eedugon commented Oct 17, 2025

Thanks @shainaraskas, we would need someone from security devs to review if these changes make sense.

And validate the troubleshooting suggestion that I'd prefer to add in a separate PR.

@eedugon eedugon requested review from a team and removed request for jkakavas October 17, 2025 11:35
@eedugon
Copy link
Contributor Author

eedugon commented Oct 17, 2025

Asking in es-security for a quick review, per Ioannis' suggestion ;)

Copy link
Contributor

@richard-dennehy richard-dennehy left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Possibly out of scope for this change, but we have a very similar page explaining how to configure the SAML Realm for Entra ID that would benefit from a similar note about group overage.

https://www.elastic.co/docs/deploy-manage/users-roles/cluster-or-deployment-auth/saml-entra

Also FYI, we have a plugin that uses Microsoft Graph to work around this exact issue. We'd prefer customers configured the list of groups as you've described here, but we had a customer who insisted that wasn't a reasonable option for them, so we built this plugin.

https://www.elastic.co/docs/reference/elasticsearch/plugins/ms-graph-authz

@eedugon
Copy link
Contributor Author

eedugon commented Oct 18, 2025

@richard-dennehy , million thanks for your feedback and comments! I'll work something out, trying to:

Again, thanks for taking time on this!

@eedugon
Copy link
Contributor Author

eedugon commented Oct 23, 2025

@richard-dennehy , I've applied all your suggestions, let us know if the text looks better now and if it's ok if we include the same admonition box in the SAML-Entra document.

Thanks a lot for your collaboration here, I think now looks much better than the original version :)

@eedugon eedugon enabled auto-merge (squash) October 23, 2025 15:24
@eedugon eedugon changed the title OIDC clarifications and tip for Azure added OIDC and SAML clarifications for Azure Oct 23, 2025
@eedugon eedugon merged commit d9f3878 into main Oct 23, 2025
6 of 7 checks passed
@eedugon eedugon deleted the oidc_enhancement branch October 23, 2025 15:32
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

3 participants