Skip to content

Commit

Permalink
Change /_plugins/_security/.. routes to /_opendistro/_security/... fo…
Browse files Browse the repository at this point in the history
…r SAML until plugins route is supported (#877)

Signed-off-by: Craig Perkins <[email protected]>

Signed-off-by: Craig Perkins <[email protected]>
  • Loading branch information
cwperks authored Aug 11, 2022
1 parent c280b58 commit 206e97a
Showing 1 changed file with 4 additions and 4 deletions.
8 changes: 4 additions & 4 deletions _security-plugin/configuration/saml.md
Original file line number Diff line number Diff line change
Expand Up @@ -305,25 +305,25 @@ opensearch_security.auth.type: "saml"
In addition, you must add the OpenSearch Dashboards endpoint for validating the SAML assertions to your allow list:

```yml
server.xsrf.allowlist: ["/_plugins/_security/saml/acs"]
server.xsrf.allowlist: ["/_opendistro/_security/saml/acs"]
```

If you use the logout POST binding, you also need to ad the logout endpoint to your allow list:

```yml
server.xsrf.allowlist: ["/_plugins/_security/saml/acs", "/_plugins/_security/saml/logout"]
server.xsrf.allowlist: ["/_opendistro/_security/saml/acs", "/_opendistro/_security/saml/logout"]
```

### IdP-initiated SSO

To use IdP-initiated SSO, set the Assertion Consumer Service endpoint of your IdP to this:

```
/_plugins/_security/saml/acs/idpinitiated
/_opendistro/_security/saml/acs/idpinitiated
```

Then add this endpoint to `server.xsrf.allowlist` in `opensearch_dashboards.yml`:

```yml
server.xsrf.allowlist: ["/_plugins/_security/saml/acs/idpinitiated", "/_plugins/_security/saml/acs", "/_plugins/_security/saml/logout"]
server.xsrf.allowlist: ["/_opendistro/_security/saml/acs/idpinitiated", "/_opendistro/_security/saml/acs", "/_opendistro/_security/saml/logout"]
```

0 comments on commit 206e97a

Please sign in to comment.