Okta

How to Configure SAML 2.0 for Amazon Managed Grafana


Read this before you enable SAML

Enabling SAML will affect all users who use this application, which means that users will not be able to sign in through their regular sign-in page. They will be able to access the app through the Okta service.

Backup URL

Amazon Managed Grafana doesn't provide a backup sign-in URL where users can sign in using their regular username and password. However, users can disable SAML from their console.

Contents

Supported Features

The Okta/Amazon Managed Grafana SAML integration currently supports the following features:

For more information on the listed features, visit the Okta Glossary.


Configuration Steps

  1. Sign in to your AWS console, then navigate to Amazon Managed Grafana.

  2. On right side, click Create Workspace.

  3. On the Create New Workspace page enter a Workspace name and optional Workspace description, then click Next.

    AWS Console > Amazon Managed Grafana, Create Workspace
  4. On the Configure Settings page, select Security Assertion Markup Language (SAML), as the authentication method, and Service Managed as the Permission type, then click Next.

    AWS Console > Amazon Managed Grafana.  SAML authentication method, Service Managed
  5. On the IAM permission access settings page, keep the default settings, then click Next.

    AWS Console > Amazon Managed Grafana > IAM permission access settings
  6. Click Create workspace.

    AWS Console > Amazon Managed Grafana, Create Workspace
  7. On the Workspace page, click SAML Configuration.

  8. Enter the following:

    • Service provider identifier (Entity ID: Make a copy of the Name Space and Region values.

      https://[namespace].grafana-workspace.[region].amazonaws.com/saml/metadata.

    • Import the metadata: Select URL as the Import method, then copy and paste the following Metadata URL:

      Sign into the Okta Admin dashboard to generate this value.

    • Assertion Mapping (Optional). See Notes for details.

      • Assertion attribute role: Enter Role

      • Admin role values: Enter ADMIN

    • Under Additional settings - optional, enter the following:

      • Assertion attribute name: displayName

      • Assertion attribute login: mail

      • Assertion attribute email: mail

    • Click Save SAML configuration.

    AWS Console > Amazon Managed Grafana, enter SAML config values AWS Console > Amazon Managed Grafana, enter SAML config values
  9. In Okta, select the Single Sign on tab for the Amazon Managed Grafana SAML app, then click Edit and enter the following:

    • Name Space: Enter your Name Space (step 8).

    • Region: Please Enter your Region (step 8).

    • Click Save.

  10. Done!


Notes

SP-initiated SSO

  1. Go to: https://www.secureflag.com/login.html

  2. Enter your Email Address, then click Login.


Assertion Mapping