SAML
Note: This feature is available in Enterprise, AWS, Team editions only.
Table of contents
SAML configuration
If your Identity Provider uses SAML (Security Assertion Markup Language), follow this guide.
Enabling SAML authentication
Go to the Administration menu and enable SAML in the Server configuration tab.
Configuring an external identity provider
Go to the Identity Providers tab and create a new configuration using the SAML IdP details.
Add details from your SAML IdP into the new configuration in CloudBeaver.
Configuring CloudBeaver integration in an external identity provider
Open the created configuration in CloudBeaver and copy the ACS and Entity ID links.
Go to the SAML IdP website and add the ACS and Entity ID links to the SSO access settings, assign users and add the attribute mappings according to the SAML IdP requirements.
Each identity provider has its own configuration procedure, we will show how to do it in AWS in the next chapter.
AWS SSO configuration
Configuration
Go to the Identity Providers tab and create a new configuration using the SAML IdP details as it is described above.
Add details from your SAML IdP into the new configuration in CloudBeaver.
Configuration in Amazon Configuration in CloudBeaver AWS SSO sign-in URL IDP sign on URL AWS SSO sign-out URL IDP logout URL AWS SSO issuer URL IDP Entity ID Specify parameters:
Parameter Value Application ACS URL ACS link from CloudBeaver Application SAML audience Entity ID link from CloudBeaver
Attributes
Attributes explanation:
Attribute | Value | Meaning |
---|---|---|
Subject | ${user:email} | User unique identifier (nameId). It is usually an email address. |
https://aws.amazon.com/SAML/Attributes/SessionDuration | 1800 | Session duration in seconds. 1800 (30 minutes) is the default value |
https://aws.amazon.com/SAML/Attributes/Role | roleARN, idpARN | IAM role identifier |
Role is the most important attribute, it defines which IAM role will be used for user federation session. Role format: roleARN, idpARN. You can get role ARN in AWS IAM section https://console.aws.amazon.com/iamv2/home#/roles. Role ARN looks like this: arn:aws:iam::123678087624:role/RoleForSAMLAccess.
You can get IDP ARN in AWS identity providers page https://console.aws.amazon.com/iamv2/home#/identity_providers. IDP ARN looks like this: arn:aws:iam::123678087624:saml-provider/GSuiteSAML.
Testing SAML authentication
The Federated tab becomes available in the CloudBeaver authentication dialog after creating the configuration. The user can select the configuration and thereafter login into the application using SSO.