Friday, August 11, 2023
HomeBig DataConfigure SAML federation for Amazon OpenSearch Serverless with Okta

Configure SAML federation for Amazon OpenSearch Serverless with Okta


Trendy purposes apply safety controls throughout many techniques and their subsystems. Holding all of those techniques in sync could be a significant endeavor if you happen to tried to implement it individually. Centralized identification administration is the way in which to take care of a single identification supplier (IdP) that may authenticate actors and handle and distribute their rights.

OpenSearch is an open-source search and analytics suite that lets you ingest, retailer, analyze, and visualize full textual content and log knowledge. Amazon OpenSearch Serverless makes it easy to deploy, scale, and function OpenSearch within the AWS Cloud, liberating you from the undifferentiated heavy lifting of sizing, scaling, and working an OpenSearch cluster. Whenever you use OpenSearch Serverless, you possibly can combine together with your present Safety Assertion Markup Language 2.0 (SAML)-compliant IdP to supply granular entry management on your OpenSearch Serverless collections. Our clients use quite a lot of IdPs, together with AWS IAM Id Heart (successor to AWS SSO), Okta, Keycloak, Energetic Listing Federation Companies (AD FS), and Auth0.

On this publish, you’ll discover ways to use Okta as your IdP and combine it with OpenSearch Serverless to securely handle your customers and teams for safe entry to your knowledge.

Resolution overview

The circulate of entry requests is depicted within the following determine.

Whenever you navigate to OpenSearch Dashboards, the workflow steps are as follows:

  1. OpenSearch Serverless generates a SAML authentication request.
  2. OpenSearch Serverless redirects your request again to the browser.
  3. The browser redirects to the Okta URL through the Okta utility setup.
  4. Okta parses the SAML request, authenticates the consumer, and generates a SAML response.
  5. Okta returns the encoded SAML response to the browser.
  6. The browser sends the SAML response again to the OpenSearch Serverless Assertion Client Companies (ACS) URL.
  7. ACS verifies the SAML response and logs within the consumer with the permissions outlined within the knowledge entry coverage.

Conditions

Full the next prerequisite steps:

  1. Create an OpenSearch Serverless assortment. For directions, confer with Preview: Amazon OpenSearch Serverless – Run Search and Analytics Workloads with out Managing Clusters.
  2. Make an observation of your AWS account ID to make use of whereas configuring your utility in Okta.
  3. Create an Okta account, which you’ll use as an IdP.
  4. Create customers and a gaggle in Okta:
    1. Log in to your Okta account, and within the navigation pane, select Listing, then select Teams.
    2. Select Add Group and title itopensearch-serverless, then select Save.
    3. Select Assign Individuals so as to add customers.
    4. You possibly can add customers to theopensearch-serverlessgroup by selecting the plus signal subsequent to the consumer title, or you possibly can select Add All.
    5. Add your customers, then select Save.
    6. To create new customers, select Individuals within the navigation pane beneath Listing, then select Add Particular person.
    7. Present your first title, final title, consumer title (e mail ID), and first e mail handle.
    8. For Password, select Set by admin and First-time password.
    9. To create your consumer, select Save.
    10. Within the navigation pane, select Teams, then select theopensearch-serverless group you created earlier.

The next graphic provides a fast demonstration of organising a consumer and group.

Configure an utility in Okta

To configure an utility in Okta, full the next steps:

  1. Navigate to the Functions web page on the Okta console.
  2. Select App Integration, choose SAML 2.0 net utility, then select Subsequent.
  3. For Title, enter a reputation for the app (for instance, myweblogs), then select Subsequent.
  4. Beneath Utility ACS URL, enter the URL utilizing the format https://assortment.<REGION>.aoss.amazonaws.com/_saml/acs (substitute <REGION> with the corresponding Area) to generate the IdP metadata.
  5. Choose Use this for Recipient URL and Vacation spot URL to make use of the identical ACS URL because the recipient and vacation spot.
  6. Specify aws:opensearch:<AWS-Account-ID> beneath Viewers URI (SP Entity ID). This specifies who the assertion is meant for inside the SAML assertion.
  7. Beneath Group Attribute Statements, enter a reputation that’s related to your utility, similar to mygroup, and choose unspecified because the title format. (Don’t overlook this title, you’ll want it later.)
  8. Choose equals because the filter and enter opensearch-serverless.
  9. Choose I’m a software program vendor. I’d prefer to combine my app with Okta and select End.
  10. After an app is created, select the sign-on tab, scroll all the way down to the metadata particulars, and duplicate the worth for Metadata URL.

The next graphic provides a fast demonstration of organising an utility in Okta through the previous steps.

Subsequent, you affiliate the customers and teams to the appliance that you simply created within the earlier step.

  1. On the Functions web page, select the app you created earlier.
  2. On the Assignments tab, select Assign.
  3. Choose Assign To Teams and select the group you want to assign to (opensearch-serverlesson this case).
  4. Select Accomplished.

The next graphic provides a fast demonstration of assigning teams to the appliance through the previous steps.

Arrange SAML on OpenSearch Serverless

On this part, you create a SAML supplier that you simply’ll use on your OpenSearch Serverless assortment. Full the next steps:

  1. Open the OpenSearch Serverless console on a brand new tab.
  2. Within the navigation pane, beneath Serverless, select SAML authentication.
  3. Choose Add SAML supplier.
  4. Present a recognizable title (for instance, okta) and an outline.
  5. Open a brand new tab and enter the copied metadata URL into your browser.

You need to see the metadata for the Okta utility.

  1. Be aware of this metadata and duplicate it to your clipboard.
  2. On the OpenSearch Service console tab, enter this metadata within the Present metadata out of your IdP part.
  3. Beneath Extra settings, enter mygroup or the group attribute offered within the Okta configuration.
  4. Select Create a SAML supplier.

The SAML supplier has now been created.

The next graphic provides a fast demonstration of organising the SAML supplier in OpenSearch Serverless through the previous steps.

Replace the information entry coverage

You have to configure the correct permissions within the knowledge entry insurance policies related together with your OpenSearch assortment so your Okta group members can entry the OpenSearch Dashboards endpoint.

  1. On the OpenSearch Serverless console, open your assortment.
  2. Select the information entry coverage related to the gathering within the Knowledge Entry part.
  3. Select Edit.
  4. Select Principals and Add a SAML principal.
  5. Choose the SAML supplier you created earlier and enter group/opensearch-serverless subsequent to it.
  6. The OpenSearch Dashboards endpoint may be accessed by all group members. You possibly can grant entry to collections, indexes, or each.
  7. Select Save.

Log in to OpenSearch Dashboards

Now that you’ve set permissions to entry the dashboards, select the Dashboards URL beneath the final info for the OpenSearch Serverless assortment. This could take you to the web site
https://collection-endpoint/_dashboards/

You will note an inventory with all of the entry choices. Select the SAML supplier that you simply created (okta on this case) and log in utilizing your Okta credentials. You’ll now be logged into OpenSearch Dashboards with the permissions which are a part of the information entry coverage. You possibly can carry out searches or create visualizations from the dashboard.

Clear up

To keep away from undesirable prices, delete the OpenSearch Serverless assortment, knowledge entry coverage, and SAML supplier created as a part of this demonstration.

Abstract

On this publish, you realized learn how to arrange Okta as an IdP to entry OpenSearch Dashboards utilizing SAML. You additionally realized learn how to arrange customers and teams inside Okta and configure their entry to OpenSearch Dashboards. For extra particulars, confer with SAML authentication for Amazon OpenSearch Serverless.

You too can confer with the Getting began with Amazon OpenSearch Serverless workshop to know extra about OpenSearch Serverless.

In case you have suggestions about this publish, submit it within the feedback part. In case you have questions on this publish, begin a brand new thread on the OpenSearch Service discussion board or contact AWS Help.


In regards to the Authors

Aish Gunasekar is a Specialist Options architect with a deal with Amazon OpenSearch Service. Her ardour at AWS is to assist clients design extremely scalable architectures and assist them of their cloud adoption journey. Exterior of labor, she enjoys mountaineering and baking.

Prashant Agrawal is a Sr. Search Specialist Options Architect with Amazon OpenSearch Service. He works intently with clients to assist them migrate their workloads to the cloud and helps present clients fine-tune their clusters to attain higher efficiency and save on value. Earlier than becoming a member of AWS, he helped varied clients use OpenSearch and Elasticsearch for his or her search and log analytics use circumstances. When not working, yow will discover him touring and exploring new locations. In brief, he likes doing Eat → Journey → Repeat.



Supply hyperlink

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments