Active Directory Federation Services

ADFS is a software component from Microsoft that runs on Windows. It can provide users with single sign-on access to Humio.

To configure the ADFS for integration with Humio, first add a new Relying Party Trust. Click Start and then select Enter data about the relying party manually and click Next.

In the Configure URL tab, enable support for the SAML 2.0 WebSSO protocol. Use http(s)://$YOUR_HUMIO_URL/api/v1/saml/acs

In the Configure Identifiers tab, add http(s)://$YOUR_HUMIO_URL/api/v1/saml/metadata. In the last tab, make sure to check Configure claims issuance policy for this application.

In the new pop-up, add a rule with the rule type, Send LDAP Attributes as Claims. In the table on the left side (LDAP attribute), select Email Addresses. Then, in the table on the right side (Outgoing claim type), select Name ID.

Now, add another rule, also with the rule type, Send LDAP Attributes as Claims. In the table on the left side (LDAP attribute), select Is-Member-of:DL. In the table on the right side (Outgoing claim type), select Group.

You will need to find the metadata XML at this URL, adjusting the domain address to your domain: https://<ADFSURL_PUBLIC_URL>/FederationMetadata/2007-06/FederationMetadata.xml>

You will also need the entityId as Idp Entity Id, as well as the <SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" as Sign on URL, and X509Certificate as Certificate in Base 64

If you have a self-hosted installation of Humio, you need to save the certificate as a PEM file on the server.

To configure Humio on your own server, go to the top of this page on Configuring Humio. To use SAML with Humio Cloud, go to the Identity Providers documentation page.

See the Active Directory FS Documentation for more information.