This website uses cookies. By clicking Accept, you consent to the use of cookies.
Click Here
to learn more about how we use cookies.
Accept
Reject
I figured out how to get JumpCloud SSO working with AWS Grafana managed service, and thought I would make a post outlining the steps I went through to get it working. This is just worked for me. I'm open to suggestions for improvements.
SSO (JumpCloud)
First, we need to set up the basic SSO between JumpCloud and Grafana. This will allow you to log into the Grafana service as a “viewer” but won’t provide “editor” or “admin” rights.
AWS Grafana Managed Service
Starting with the Grafana service, we have to create a new workspace and start to configure it.
Create a new workspace -
https://us-east-1.console.aws.amazon.com/grafana/home?region=us-east-1#/workspaces
Click the “SAML Configuration” button
Make note of the IdP URLs
Service provider identifier (Entity ID)
Service provider reply URL (Assertion consumer service URL)
Service provider login URL
Update the assertions:
Assertion attribute name:
displayName
Assertion attribute login:
mail
Assertion attribute email:
mail
Login validity duration (in minutes):
1440
- or whatever you want
JumpCloud Console
Next we move to the JumpCloud console and configure it using the values from the AWS Grafana setup.
Create a new SSO application in JumpCloud
Name it “Grafana” and choose a logo / color
Use the following values:
IdP Entity ID
:
JumpCloud
SP Entity ID
: Use the “Entity ID” URL from AWS Grafana (ends in “metadata”):
https://g-zzzzzzz.grafana-workspace.us-east-1.amazonaws.com/saml/metadata
ACS URL
: Use the “Assertion consumer service URL” URL from AWS Grafana (ends in “acs”):
https://g-zzzzzzzzzz.grafana-workspace.us-east-1.amazonaws.com/saml/acs
SAMLSubject NameID
:
email
SAMLSubject NameID Format
:
urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
Signature Algorithm
:
RSA-SHA256
Sign Assertion
:
< checked >
Default Relay State
:
< blank >
Login URL: Use the “Service provider login URL” from AWS Grafana (ends in “login/saml”):
https://g-zzzzzzzzzz.grafana-workspace.us-east-1.amazonaws.com/login/saml
Declare Redirect Endpoint
:
< checked >
IDP URL
:
https://sso.jumpcloud.com/saml2/grafana
Attributes
:
Service Provider Attribute Name
:
displayName
;
JumpCloud Attribute Name
:
displayname
Service Provider Attribute Name
:
mail
;
JumpCloud Attribute Name
:
email
Save the changes
Export the “metadata” XML file for the next step
AWS Grafana Managed Service
Go back to the Grafana console and finish up.
Import the “metadata” XML file from JumpCloud
Save the changes
Permissions
In order to access Grafana as an “editor” or an “admin” we need to do a couple of extra steps.
JumpCloud Console
We’re going to create some user groups to indicate Grafana editors and administrators. Or you could use already existing groups.
Create 2 User Groups named “Grafana Admins” & “Grafana Editors”
Update the “Users” section:
In each group, add a Custom Attribute:
Attribute Name:
Grafana
Attribute Value: Admin or Editor - depending on the role of these users
Update the “Applications” section:
Bind the group to the “Grafana” application
Update the other aspects of the user group however you want to; add users, device groups, etc.
We also need to update the Grafana SSO application slightly to add a new attribute.
Open the Grafana SSO application and chose the “SSO” panel.
Under “Attributes” add a new attribute with these values:
Service Provider Attribute Name
:
Grafana
JumpCloud Attribute Name
:
Grafana
AWS Grafana Managed Service
Finally, we need to tell Grafana how to recognize “admins” and “editors”.
Choose your workspace and open the SAML configuration
Under “Map assertion attributes”:
Assertion attribute role
:
Grafana
Admin role values
:
Admin
Under “Additional settings - optional”:
Editor role values
:
Editor
Save the config and you’re done.
How can MSPs be notified of critical alerts on their managed clients in their PSA?
in
JumpCloud Product Discussions
04-24-2023
How can MSPs reconcile vendor invoices through PSA automation?
in
JumpCloud Product Discussions
04-21-2023
JumpCloud RADIUS Certificate Based Authentication is now Generally Available and Free for All Organizations!
in
JumpCloud Product News
12-14-2022
Modernizing the Login Experience: Identity First Login flow for User Portal and IDP Login pages
in
JumpCloud Product News
11-11-2022