Configuring SAML
Last updated
Was this helpful?
Last updated
Was this helpful?
To enable SAML integration, additional steps are required. First, configure the Identity Provider with the following information. Visitfor more details.
SSO URL / ACS (Assertion Consumer Service)
https://arize-app.<my-organization>.com/auth/v2/saml
Audience URI / EntityID
https://arize-app.<my-organization>.com
UserName / NameID Format
urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
Once the IDP provider is configured, add or update the baseOverlay
section in values.yaml
with the IDP example below and modify the content according to the environment.
The emailDomain is from the email addresses that will be used to login. For example joe@example.com.
The accountID, accountOrganizationID, and spaceID fields should always be set to 1 for on-prem deployments.
The sync option enables the synchronization of RBAC roles with the IDP provider each time a user logs in.
The role_mappings section is optional and should be customized based on the desired RBAC roles.
The metadata comes from the IDP provider. There are 2 ways to supply the metadata:
Using the metadataURL
if a URL is available and reachable from the cluster.
By supplying the full XML metadata using a block scalar, as such: metadata: |
.
values.yaml:
Alternatively, the user can embed the XML as follows: