Configure Basic SAML SaaS Authentication
This page provides guidelines for configuring basic SAML authentication.
Configure SAML Authentication for the Identity Provider
You can configure an identity provider to enable single sign-on access to the Splunk AppDynamics Controller Tenant using the SAML 2.0 protocol. Refer to your identity provider documentation for detailed configuration instructions.
SAML Settings for the Identity Provider
Your identity provider requires the following information about your Splunk AppDynamics Controller Tenant for the SAML settings. The <controller_domain>
Setting | Description |
---|---|
Audience URI (Service Provider Entity ID) |
The unique identifier for use in the SAML assertion. In most cases, it is the Service Provider Entity ID, unless the Service Provider decides to use a different identifier.
|
Single Sign-On URL (Assertion Consumer URL) |
The Splunk AppDynamics endpoint to service SAML Authentication. You must specify your Splunk AppDynamicsaccount name with the query string parameter accountName
|
SAML Attributes for the Identity Provider (Recommended)
You set the attributes with your identity provider that map to SAML users in your Splunk AppDynamics account. When the attributes are set, the user information displays on the Controller Tenant UI, such as the username and email. Changes to these attributes on the IdP will update the mapped SAML attributes on the Splunk AppDynamics Controller Tenant when the user successfully logs in.
This table shows how IdP example attributes map to the Username Attribute,Display Name Attribute, and the Email Attribute settings of the Controller Tenant:
Example Attribute Name | Example Attribute Values | Description |
---|---|---|
Username Attribute | User.loginName
|
Unique identifier for the user in the SAML response. This value corresponds to the Splunk AppDynamics username If you do not map a username, Splunk AppDynamics obtains the username NameId emailaddress |
Display Name Attribute | User.fullName
|
Informal name for the user corresponding to the Splunk AppDynamics Name |
Email Attribute | User.email
|
User's email address, corresponding to Splunk AppDynamics email |
Configure SAML Authentication from the Controller Tenant
To configure SAML authentication from the Controller Tenant:
Configure SAML AuthenticationVerify the SAML Authentication Configuration
The best way to verify that you have configured SAML authentication correctly is to log in to your Splunk AppDynamics Controller Tenant.
This procedure shows the SAML flow from the service provider (your Controller Tenant) and describes the SAML requests and responses. You can also start the SAML flow from the IdP.
- Navigate to your Splunk AppDynamics Controller Tenant. The Login dialog for your 3rd-party IdP service appears.
- Click Login. The system redirects you to your IdP.
- Enter and submit your credentials. The IdP redirects you to your Splunk AppDynamics Controller Tenant.
If you set SAML attributes to map to the user account, you can view the user information in Settings > My Preferences.
If you set default permissions so the default role applies to the user, you can view the information in Settings > Administration.