添加链接
link管理
链接快照平台
  • 输入网页链接,自动生成快照
  • 标签化管理网页链接

Amazon Managed Grafana SAML Single Sign-On (SSO) integration

This topic contains procedures to configure Amazon Managed Grafana for Single Sign-On (SSO) in CyberArk Identity using SAML.

With CyberArk as your identity service, your users can have single-sign-on (SSO) access to the Amazon Managed Grafana web applications with SP-initiated SAML SSO (for SSO access directly through the Amazon Managed Grafana web application).

Amazon Managed Grafana SSO supported features

This application template supports SP-initiated single sign-on.

Prerequisites for Amazon Managed Grafana SSO

An AWS account root user.

Access to the Amazon Managed Grafana Workspace for SAML configuration

Configure the Amazon Managed Grafana app template in the Identity Administration portal

The following procedure describes the steps in the Identity Administration portal needed to configure the Amazon Managed Grafana app template for SSO.

Step 1: Add the Amazon Managed Grafana web app template.

In the Identity Administration portal , select Apps & Widgets > Web Apps , then click Add Web Apps .

On the Search page, enter the application name in the Search field and click the search button.

Next to the application name, click Add .

On the Add Web App page, click Yes to confirm.

Click Close to exit the Application Catalog.

The application opens to the Settings page.

Step 2: Configure the Settings page.

Set an app name, description, and logo if you want to change them.

Under Advanced, uncheck Show in user app list .

Show in user app list is only applicable to IdP-initiated sign in; this application template only supports SP-initiated sign in.

In the Identity Provider Configuration section, select Metadata , then click Copy URL to copy the URL of the certificate.

This URL is used later when you configure the SAML integration in the Amazon Managed Grafana workspace.

Assertion Consumer Service (ACS) URL

Matches the service provider reply URL from the Amazon Managed Grafana workspace. Sign Response or Assertion? Set to Assertion.

NameID Format

Set to emailAddress.

Verify the following attributes with the Amazon Managed Grafana Workspace attribute name in the Attribute Name column and the CyberArk attribute in the Attribute Value column.

Attributes are case-sensitive.

Step 5: Configure the Permissions page to grant Amazon Managed Grafana users SSO access.

Grant SSO access to Amazon Managed Grafana by assigning permissions to users, groups, or roles.

To grant SSO access to Amazon Managed Grafana admin users, you need to create a role in CyberArk Identity with the same name as the admin users' role in Amazon Managed Grafana. When you populate the role membership in CyberArk Identity , those users are mapped to the Amazon Managed Grafana admin users' role through the default attribute mappings on the SAML Response page.

On the Permissions page, click Add .

Select the user(s), group(s), or role(s) that you want to grant permissions to, then click Add .

The added object displays on the Permissions page with View, Run, and Automatically Deploy permissions selected by default.

Select the permissions you want and click Save .

Default permissions automatically deploy the application to the User Portal if the Show in user app list option is selected on the Settings page. Do not select this option if you intend to use only SP-initiated SSO.

Change the permissions if you want to add additional control or if you prefer not to automatically deploy the application.

Step 6: Review and save.

Review your settings to confirm your configuration. For example, you might want to verify that you selected the appropriate users, groups, or roles on the Permissions page. Click Save when you are satisfied.

Configure Amazon Managed Grafana for SAML single sign-on

The following procedure describes the steps in the Amazon Managed Grafana Workspace needed to configure the Amazon Managed Grafana app template for SSO.

Sign in to the Amazon Managed Grafana Workspace with your AWS account root user.

Click SAML Configuration .

Click Save SAML Configuration to complete the SSO configuration in Amazon Managed Grafana.

Test the Amazon Managed Grafana SSO configuration

Now that you have finished configuring the application template settings in the Identity Administration portal and the Amazon Managed Grafana workspace, Amazon Managed Grafana users can benefit from SP-initiated SSO.

Enter the Amazon Managed Grafana sign in page URL in your browser.

Click Sign In with SAML .

If you are already signed in to CyberArk Identity , you are redirected to the Amazon Managed Grafana user dashboard.

If you are not signed in to CyberArk Identity , you are redirected to CyberArk Identity sign in page, and then redirected to the Amazon Managed Grafana user dashboard after successful authentication.

  • Amazon Managed Grafana SSO supported features
  • Prerequisites for Amazon Managed Grafana SSO
  • Configure the Amazon Managed Grafana app template in the Identity Administration portal
  • Step 1: Add the Amazon Managed Grafana web app template.
  • Step 2: Configure the Settings page.
  • Step 3: Configure the Trust page.
  • Step 4: Configure the SAML Response page.
  • Step 5: Configure the Permissions page to grant Amazon Managed Grafana users SSO access.
  • Step 6: Review and save.
  • Configure Amazon Managed Grafana for SAML single sign-on
  • Test the Amazon Managed Grafana SSO configuration

    Home What's new 2024-03-15 /product-menu.html /Portal/Content/Resources/_TopNav/cc_Portal.htm Identity
    Version
  • What's New
  • Our Products
  •