Configure Single Sign-on Through SAML
This page provides instructions for configuring Single Sign-on (SSO) through Security Assertion Markup Language (SAML).
You can configure an Identity Provider (IdP) to enable single sign-on access to your Splunk AppDynamics environment. Splunk AppDynamics can authenticate and authorize users through the Cisco Customer Identity or an external SAML 2.0 protocol IdP. The Cisco Customer Identity will enable users to reuse an existing Cisco Identity and redirect them to the Cisco Identity Provider (IdP) when signing in.
Refer to the documentation of your identity provider for detailed configuration instructions. See Configure SAML Authentication for the Identity Provider.
Supported Identity Providers
Splunk AppDynamics certifies support for the following IdPs:
- Okta
- Onelogin
- Ping Identity
- Azure AD
- IBM Cloud Identity
- Active Directory Federation Service (AD FS)
Other IdPs supporting HTTP POST binding are also compatible with Splunk AppDynamics SAML authentication. If you are having issues setting up SAML with your IdP, contact Splunk AppDynamics customer support for help.
Configure SAML Authentication
The processes described vary slightly based on your choice to upload your IdP data or to enter it manually.
The following two flows make it easier for you to configure SAML and reduce the need to go back and forth between your IdP and Splunk AppDynamics:
- Configure your IdP with AppDynamics
- See Configure AppDynamics in Your IdP.
- Configure AppDynamics in your IdP
- See Configure your IdP with AppDynamics.
You can now also map users to the SAML IdP through User Management. See Create a New User.
Verify SAML Authentication Configuration
To verify that you configured SAML authentication correctly, navigate to accounts.appdynamics.com.
-
If you chose to authenticate through your IdP, the sign-in screen asks for your email and redirects you to your IdP for authentication.
-
If you chose to authenticate through AppDynamics, the sign-in screen requests your email and passwo
Configure AppDynamics in Your IdP
- Select Configure AppDynamics in your IdP.
- Click Next.
- From Set up AppDynamics metadata in your IdP, enter value for the following fields:
- Assertion consumer service URL- The web address (URL) used by your service provider (SP) to receive and process authentication information (SAML response) from an identity provider (IdP).
- Service provider entity ID- The web address (URL) of a service provider (SP) used by the identity provider (IdP) to identify and establish trust with the service provider (SP).
- Request binding- The HTTP method to send an authorization request to an authorization server.
- Confirm that each of the fields has been completed and click Next.
- From Provide metadata from your identify provider (IdP):
- Confirm that each of the fields has been completed and click Next.
- From fname lname email Map your IdP attributes to AppDynamics attributes, enter attributes from your IdP and the corresponding attribute values for AppDynamics. For example, you might map the IdP attributes
- Click Next.
- Select the Tenants you want to provision by default.
- Click Save.
- Copy and share the JIT provisioning link with members of your organization needing an Splunk AppDynamics user profile with Community and training access.
Configure your IdP with AppDynamics
- Select Configure your IdP in AppDynamics.
- Click Next.
- Click Upload metadata to upload the IdP metadata from your local drive or manually enter/select values for the following fields:
- Single sign-on URL- (SSO URL) A unique URL allowing users to access multiple applications and services with one set of login credentials.
- X.509 Certificate- A digital certificate using the X.509 standard to verify the identity of a person, organization, or device in a secure and encrypted manner.
- Issuer ID- A unique identifier assigned to the entity that issues a digital certificate. It helps to verify the authenticity of the certificate and trace its chain of trust back to the root certificate authority.
- Request Binding- The HTTP method to send an authorization request to an authorization server.
- Confirm that each of the fields has been completed and click Next.
- From Set up AppDynamics metadata in your IdP, enter values for the following fields:
- Assertion consumer service URL- The URL where a web service provider receives authentication assertions from an identity provider during SSO.
- Service provider entity ID- The unique identifier (URL) for the service provider in a SAML (Security Assertion Markup Language) transaction.
- Request binding- The HTTP method to send an authorization request to an authorization server.
- Confirm that each of the fields has been completed and click Next.
- From Map your IdP attributes to AppDynamics attributes, enter attributes from your IdP and the corresponding attribute values for Splunk AppDynamics. For example, you might map the IdP attributes fname, lname, and email to the Splunk AppDynamics attributes First Name, Last Name, and Email.
- Click Next.
- Select the Tenants you want to provision by default.
- Click Save.
- Copy and share the JIT provisioning link with members of your organization needing an Splunk AppDynamics user profile with Community and training access.
Configure SAML Authentication for the Identity Provider
SAML Settings for the Identity Provider
Your identity provider requires information about your account for the SAML settings. This doesn't apply to all SaaS Tenants.
Setting | Description |
---|---|
Issuer ID (Service Provider Entity ID) |
The unique identifier intended for the SAML assertion. In most cases, it is the Service Provider Entity ID, unless the Service Provider decides to use a different identifier.
|
Single Sign-On URL (Assertion Consumer URL) |
The Splunk AppDynamics endpoint to service SAML Authentication. You need to specify your Splunk AppDynamics account name with the query string parameter accountName as shown with the following syntax and example:
|
SAML Attributes for the Identity Provider
You set attributes with your identity provider to map attribute values to Splunk AppDynamics SAML users. Once the attributes are set, the Splunk AppDynamics Account Administrator can view the attribute values mapped to a user from the Account Management Portal.
The following table shows how IdP example attributes map to the First Name, Last Name, and Email attribute settings of a SAML user:
Example Attribute Name | Example Attribute Values | Description |
---|---|---|
First Name | Jane |
Informal name for the user corresponding to the AppDynamics firstName |
Last Name | Doe | Informal name for the user corresponding to the AppDynamics lastName field. |
Jane.Doe@company.com |
User's email address corresponding to AppDynamics e mailAddress |
JIT Provisioning
Administrators can initiate JIT provisioning of users through the IdP or the Service Provider (Splunk AppDynamics Accounts):
- JIT-initiated by IdP: Administrators configure SAML authentication, and users visit the IdP and click a link to the Splunk AppDynamics Accounts to self-provision their user accounts.
-
JIT-initiated by Splunk AppDynamics Accounts: Administrators configure SAML authentication and generate a JIT-provisioning link that can be shared with users to self-provision their Splunk AppDynamics accounts. When team members sign in using this link, their user profile with Community and training access will be auto-created for them.
Note: The JIT provisioning link will only work if SAML federation is active and is entirely optional: Splunk AppDynamics Administrators can still manually create user profiles.
For security reasons, the JIT-provisioned users are assigned to a read-only role, so you'll need to manually update the roles of JIT-provisioned users. See Assign Tenant Roles.
Update or Fetch SAML Configuration
- Navigate to accounts.appdynamics.com.
- Go to Access Management > SAML Federation.
- From the METADATA FOR CONFIGURATION panel, click
.
- You can edit the following fields of the IdP metadata:
- Single sign-on URL
- X.509 certificate
- Issuer ID
- Click Save.
- From the ATTRIBUTE MAPPING panel, click
.
- Update any of the values for your IdP attributes.
- Click Save.
- From the JUST-IN_TIME USER PROVISIONING panel, click
.
- Check or uncheck Support to give or remove the ability of JIT-provisioned users to open and manage support requests with AppDynamics.
- Navigate to accounts.appdynamics.com.
- Go to Access Management > SAML Federation.
- Click
to copy any of the following AppDynamics metadata:
- Assertion consumer service URL
- Service provider entity ID
- Request binding
- Click Download metadata to download a copy of the AppDynamics metadata.
- From JUST-IN-TIME USER PROVISIONING, click
.
- to copy the AppDynamics sign-in link for JIT-provisioning.