About SSO integrations for Splunk Observability Cloud 🔗
Single-sign on (SSO) integrations implement SAML 2.0, which is a standard for exchanging authentication and authorization information between an identity provider (IdP) such as Ping, Okta, Microsoft Entra ID (formerly Azure Active Directory), or OneLogin and a service provider (SP) such as Splunk Observability Cloud. When you set up a new SSO integration in Splunk Observability Cloud, you authorize Splunk Observability Cloud to trust information from a particular IdP and use it for logging in users in an organization. After that trust is set up, users can log in from the IdP in an IdP-initiated flow, which starts with a portal or an app page within the IdP, or using an SP-initiated flow from a Splunk Observability Cloud login page (only available if your org has a custom domain configured).
You can see the general SSO SAML flow in the following image:
Splunk Observability Cloud adds additional security with email verification to guard against attacks between different organizations.
When setting up SSO integration, you need to provide information that permits your IdP to trust Splunk Observability Cloud and Splunk Observability Cloud to trust your IdP.
The following image shows Okta configuration information, however, all IdPs require similar information.
- The IdP requires the following information:
Application ACS (Assertion Consumer Service) URL: Where to send the assertion.
Application SAML audience: How Splunk Observability Cloud identifies itself.
Additionally, the IdP needs to know what parameters to send to Splunk Observability Cloud. The following image shows the AWS attribute mappings for the SAML assertion.
The product-specific integrations provide default values for most of these fields and you don’t have to configure them manually. When setting up generic SAML or Microsoft Entra ID (formerly Azure Active Directory) Federation Searches (FS), you need to provide all the values yourself.
The following table uses Microsoft Entra ID (formerly Azure Active Directory) as an example and shows the corresponding field names in Splunk Observability Cloud. Different IdPs may have slightly different field names. Example values are indicated in brackets.
Splunk Observability Cloud field name |
Microsoft Entra ID (formerly Azure Active Directory) field name |
---|---|
Integration ID (EPAMIDfalsg) |
Reply URL (Assertion Consumer Service URL) (https://your_realm/v1/saml/acsEPAMIDfalsg) |
Integration-specific Entity ID` (EPAMIDfalsg) |
Identifier (Entity ID) (https://your_realm/v1/saml/acsEPAMIDfalsg) |
Certificate (Base64) (upload file to replace) |
Certificate (Base64) (download file)` |
Integration ID (EPAMIDfalsg) |
Reply URL (Assertion Consumer Service URL) (https://your_realm/v1/saml/acsEPAMIDfalsg) |
Microsoft Entra ID Identifier (https://your_domain/081aaa5f-fsec-m01c-03dfalke45n) |
Microsoft Entra ID Identifier (https://your_domain/081aaa5f-fsec-m01c-03dfalke45n) |
For user attributes and claims, |
User.FirstName (user.givenname), LastName (user.surname), PersonImmutableID (user.userprincipal name), FullName (user.displayname), email (user.othermail) |