SAML Authentication in Search with OpenSearch

Learn about using SAML authentication OCI Search with OpenSearch.

OCI Search with OpenSearch supports using an identity provider for access and control to OpenSearch clusters and OpenSearch Dashboards. This is available through SAML single sign-on support in the OpenSearch Security plugin.

With SAML integration, you can configure a cluster so that OCI OpenSearch, as a SAML service provider connects to your identity provider to authenticate users and pass back an authentication token to OCI OpenSearch for access to OpenSearch clusters and OpenSearch Dashboards. You can also configure the OpenSearch Dashboard, so that users are redirected to the identity provider's sign-in page for authentication when accessing the OpenSearch Dashboard.

The following table describes the SAML configuration settings applicable to Search with OpenSearch.

SAML Configuration

Description

Field or Attribute Name

SAML metadata Metadata file that describes the identity provider's capabilities and configuration. Required.
  • Console: Metadata content
  • CLI: idp-metadata-content
  • API: idpMetadataContent
Identity ID The identity provider's name. Required.
  • Console: Identity ID
  • CLI: ipd-identity-id
  • API: ipdIdentityId
OpenSearch Dashboard URL The URL of the cluster's OpenSearch Dashboard. Optional.
  • Console: Dashboard URL
  • CLI: opendashboard-url
  • API: opendashboardUrl
Admin backend role

The backend role in the identity provider for the users who have full administrator permissions for the cluster. Optional.

  • Console: Admin backend role
  • CLI: admin-backend-role
  • API: adminBackendRole
Subject key

If the identity provider uses the default element name for users, NameID, you don't need to specify anything here. Otherwise, use this element to specify the element in the SAML response that contains the users. Optional.

  • Console: Subject key
  • CLI: subject-key
  • API: subjectKey
Roles key If you're using backend roles, this specifies the element name in the SAML response that contains the user roles. Optional
  • Console: Roles key
  • CLI: roles-key
  • API: rolesKey

Limitations and Considerations

  • Search with OpenSearch only supports enabling SAML authentication in the Console for existing clusters. You can't enable SAML authentication when you create a new cluster in the Console. You can enable SAML authentication when creating a new OpenSearch cluster using the CLI or API.

  • When you create a new cluster and enable SAML authentication using the CLI or API, you must also enable role-based access control for the cluster, with the security mode set to enforcing.

Prerequisites

  • An existing identity provider.
  • For Console only, you must have an existing OpenSearch cluster created.