Skip to content

Commit

Permalink
Revert SAML troubleshooting page to _opendistro route to match existi…
Browse files Browse the repository at this point in the history
…ng route (#2160) (#2162)

Signed-off-by: Craig Perkins <[email protected]>

Signed-off-by: Craig Perkins <[email protected]>
(cherry picked from commit 0dc659c)

Co-authored-by: Craig Perkins <[email protected]>
  • Loading branch information
opensearch-trigger-bot[bot] and cwperks authored Dec 9, 2022
1 parent 48303f1 commit 9378b78
Showing 1 changed file with 3 additions and 3 deletions.
6 changes: 3 additions & 3 deletions _troubleshoot/saml.md
Original file line number Diff line number Diff line change
Expand Up @@ -42,15 +42,15 @@ After a successful login, your IdP sends a SAML response using HTTP POST to Open
The endpoint the OpenSearch Dashboards security plugin provides is:
```
/_plugins/_security/saml/acs
/_opendistro/_security/saml/acs
```

Make sure that you have configured this endpoint correctly in your IdP. Some IdPs also require you to add all endpoints to the allow list that they send requests to. Ensure that the ACS endpoint is listed.

OpenSearch Dashboards also requires you to add this endpoint to the allow list. Make sure you have the following entry in `opensearch_dashboards.yml`:

```
server.xsrf.allowlist: [/_plugins/_security/saml/acs]
server.xsrf.allowlist: [/_opendistro/_security/saml/acs]
```


Expand Down Expand Up @@ -94,7 +94,7 @@ This setting prints the SAML response to the OpenSearch log file so that you can
Another way of inspecting the SAML response is to monitor network traffic while logging in to OpenSearch Dashboards. The IdP uses HTTP POST requests to send Base64-encoded SAML responses to:
```
/_plugins/_security/saml/acs
/_opendistro/_security/saml/acs
```
Inspect the payload of this POST request, and use a tool like [base64decode.org](https://www.base64decode.org/) to decode it.
Expand Down

0 comments on commit 9378b78

Please sign in to comment.