Dynatrace Managed supports integration with SAML 2.0 as an SSO IdP (Single Sign-On Identity Provider) for the management of users and groups. SAML can use either HTTP POST
(preferred) or HTTP Redirect
bindings. When both are present, HTTP POST
is used.
This procedure requires configuration in Dynatrace Managed and at your IdP.
From the Cluster Management Console menu, select User authentication > Single sign-on settings.
From Select single sign-on technology, select SAML 2.0
.
From Select login page, select the login options you want to offer users:
Select Download SP metadata to download (to file sp.xml
) the SAML metadata you need to provide to your SP.
The XML metadata of a SAML 2.0 Service Provider box displays the metadata.
Refer to your IdP documentation for details on these steps.
At your IdP server
sp.xml
metadata file you downloaded earlier to configure Dynatrace Managed as a Service Provider (SP).Back in the Dynatrace Managed Cluster Management Console
Each Dynatrace Managed user must be assigned to at least one user group, with at least one associated monitoring environment. Without such a mapping, the user can't sign in to Dynatrace Managed and will instead receive an error message stating that no environment has been found.
The Assign users to groups based on SAML 2.0 response attribute switch determines how you manage user-group assignments:
<Attribute Name="gr"><AttributeValue>Admins</AttributeValue><AttributeValue>Users</AttributeValue></Attribute>
Admins
and Users
groups.
<Attribute Name="gr"><AttributeValue>Admins,Users</AttributeValue></Attribute>
Admins
and Users
groups.Admins
and admins
would be two different groups.To submit a new SAML signing certificate, make a PUT request through the Cluster Management API.
In Cluster Management Console, get a ServiceProviderAPI
token.
Open the User menu in the top-right corner of the window and select Cluster Management API.
Submit the token.
Now you are authorized to issue the necessary API request.
Expand the SSO configuration section and select PUT.
Select Try it out.
The Description section displays the format expected for the body of the PUT request.
{"privateKeyEncoded": "string","publicKeyCertificateEncoded": "string"}
Paste the contents of the RSA private key and certificate to replace the corresponding privateKeyEncoded
and publicKeyCertificateEncoded
value placeholders (string
). Be sure to include the full BEGIN
and END
tags of each. In this example, the key and certificate are truncated for brevity:
{"privateKeyEncoded": "-----BEGIN RSA PRIVATE KEY-----\nMIIEowIBAAKCAQEAp8RXe0PIuDwj1ZbYrShXRxjiFnq8xmLWZlWIYkScX/1KC69M\n...\nPM3kel4na+AGibenqRs7PA6rqFeXDg193pepzWqvqmJ98W8YYecZ\n-----END RSA PRIVATE KEY-----","publicKeyCertificateEncoded": "-----BEGIN CERTIFICATE-----\nMIICzTCCAbWgAwIBAgIRAIpaHcbUOpvhKf6exsxJjVowDQYJKoZIhvcNAQELBQAw\n...\nuw==\n-----END CERTIFICATE-----"}
Select Execute to submit the request.
200
- Certificate update was successful.400
- Invalid input. Verify that you pasted the complete key and certificate, including the full BEGIN
and END
tags of each, into the body of the request as shown in the example.510
- Failed operation. Check the server logs for details.If you choose to integrate Dynatrace Managed with Active Directory Federation Services (ADFS), perform the following steps on the ADFS side and then in Dynatrace Managed.
Use the Add Relying Party Trust Wizard to add a new relying party trust using Dynatrace SP metadata configuration.
On the Advanced tab, set Secure hash algorithm to SHA-1
or SHA-256
.
Add a claim issuance policy to the added relying party trust.
Define a rule to send LDAP attributes as claims.
Define rules to transform LDAP attributes to Name ID
(create a rule appropriate to your needs).
Example of a rule to transform the LDAP login
attribute to Name ID
.
Example of a rule to transform the LDAP email
attribute to Name ID
.
On the Dynatrace Managed Single sign-on settings page, set the User group attribute appropriately.
NameId
is a login on the Dynatrace Managed side. All formats are accepted by Dynatrace Managed, so you can choose the format that best fits your policy rules.
Our recommendation for NameIdFormat
is:
urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
Upon sign-out, a global sign-out is triggered, including for your IdP, which then cascades to other services. Otherwise, you would be signed out from Dynatrace Managed, but to reauthenticate it would be sufficient to either click the Log in using SSO link on the login page, or to enter the Dynatrace Managed WebUI URL in the browser when the login page is configured to SSO.
If you want to disable it (not a good idea from a security standpoint), edit your metadata, remove all SingleLogoutService
tags, and upload the updated metadata.
Yes, customer IdP metadata can contain multiple signing certificates. Dynatrace Managed validates that SAML messages from the customer IdP are signed by one of them.
Yes, users are added following successful authentication.
This could happen when configured SSO IdP redirects sign in or sign out POST requests to other hosts.
To resolve this, go to User authentication > Single sign-on settings and add the redirect URLs to the SSO IdP redirect URLs section.