-
Notifications
You must be signed in to change notification settings - Fork 165
OIDC and SAML clarifications for Azure #3498
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
🔍 Preview links for changed docs |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
couple small edits for ya
deploy-manage/users-roles/cluster-or-deployment-auth/openid-connect.md
Outdated
Show resolved
Hide resolved
deploy-manage/users-roles/cluster-or-deployment-auth/openid-connect.md
Outdated
Show resolved
Hide resolved
deploy-manage/users-roles/cluster-or-deployment-auth/oidc-examples.md
Outdated
Show resolved
Hide resolved
deploy-manage/users-roles/cluster-or-deployment-auth/oidc-examples.md
Outdated
Show resolved
Hide resolved
Co-authored-by: shainaraskas <[email protected]>
|
Thanks @shainaraskas, we would need someone from security devs to review if these changes make sense. And validate the troubleshooting suggestion that I'd prefer to add in a separate PR. |
|
Asking in es-security for a quick review, per Ioannis' suggestion ;) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Possibly out of scope for this change, but we have a very similar page explaining how to configure the SAML Realm for Entra ID that would benefit from a similar note about group overage.
https://www.elastic.co/docs/deploy-manage/users-roles/cluster-or-deployment-auth/saml-entra
Also FYI, we have a plugin that uses Microsoft Graph to work around this exact issue. We'd prefer customers configured the list of groups as you've described here, but we had a customer who insisted that wasn't a reasonable option for them, so we built this plugin.
https://www.elastic.co/docs/reference/elasticsearch/plugins/ms-graph-authz
deploy-manage/users-roles/cluster-or-deployment-auth/oidc-examples.md
Outdated
Show resolved
Hide resolved
deploy-manage/users-roles/cluster-or-deployment-auth/oidc-examples.md
Outdated
Show resolved
Hide resolved
|
@richard-dennehy , million thanks for your feedback and comments! I'll work something out, trying to:
Again, thanks for taking time on this! |
|
@richard-dennehy , I've applied all your suggestions, let us know if the text looks better now and if it's ok if we include the same admonition box in the SAML-Entra document. Thanks a lot for your collaboration here, I think now looks much better than the original version :) |
A user shared some interesting suggestions in https://github.com/elastic/platform-docs-team/issues/553 (internal issue)
I've addressed two of them in this PR:
claims.nameandclaims.mail.The following hasn't been included as I'm not sure where we could put this information, although it looks interesting also:
I haven't found a dedicated troubleshooting doc for security realms.
@jkakavas , would you review if the addings here are technically accurate and make sense to be added to the docs? or let us know if we should ping someone else to review this small change.
Closes https://github.com/elastic/platform-docs-team/issues/553 (internal issue)