On this page:

You can configure the Controller to use SAML as an external authentication provider for the Controller UI. The Controller's SAML support allows you to include Controller UI access control into your organization's existing single sign-on systems.  

Before Starting

To configure SAML-based single sign-on for the Controller, you must have:

SAML Response Requirements

The Controller expects the following custom attributes in the SAML assertion sent by the identity provider:

Note that the display name for a user is constructed by combining the firstName and lastName attributes from the SAML response, if present. If the attributes are not present, the Controller uses the userName value as the display name for the user.

The Controller does not expect the SAML response to be encrypted, but it should be signed and is typically BASE-64 encoded.

The OneLogin widget described in Configure SAML for OneLogin provides mappings for the required parameters. For other SAML providers, you need to ensure that the values are returned directly. 

Sample Request and Response

Here is a sample request from the Controller to the SAML service provider:

<samlp:AuthnRequest xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"
    <saml:Issuer xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion">http://{appdynamics_controller_url}/controller</saml:Issuer>
    <samlp:NameIDPolicy Format="urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified"


Here is a sample response from the SAML service provider:

<samlp:Response xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion"
        <samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success" />
    <saml:Assertion xmlns:xs="http://www.w3.org/2001/XMLSchema"
        <ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
                <ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#" />
                <ds:SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1" />
                <ds:Reference URI="#pfxef90db96-f96f-5187-b381-4dd890e07105">
                        <ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature" />
                        <ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#" />
                    <ds:DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1" />
            <saml:NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress”>{username}</saml:NameID>
            <saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer">
                <saml:SubjectConfirmationData NotOnOrAfter="2014-07-08T19:04:36Z"
        <saml:Conditions NotBefore="2014-07-08T18:58:36Z"
        <saml:AuthnStatement AuthnInstant="2014-07-08T19:01:35Z"
            <saml:Attribute Name="Groups"
                <saml:AttributeValue xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
                <saml:AttributeValue xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
            <saml:Attribute Name="accountName"
                <saml:AttributeValue xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
            <saml:Attribute Name="emailAddress"
                <saml:AttributeValue xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"


Configure SAML Settings

You configure a SAML identity provider for the Controller from the authentication provider tab in the Controller UI. 

This page contains general steps for setting up SAML integration. See Configure SAML for OneLogin for sample steps that show how to configure SAML with an actual identity provider.

To configure a SAML Identity Provider
  1. As an administrator or account owner in the Controller UI, click Settings -> Administration.
  2. Click the Authentication Provider tab.
  3. Select the SAML radio button for the authentication provider to use.
    The SAML configuration screen appears: 
  4. In the Login URL field, enter the SAML Login URL. This is the address to which the Controller will send Service Provider (SP)-initiated login requests. 
  5. In the Logout URL field, enter the URL to which the browser should redirect when the user logs out. This is useful for redirecting the user back to the identity provider instead of to the AppDynamics login screen. This field is optional.
  6. In the Certificate field, paste the x.509 certificate from your identity provider configuration between the BEGIN CERTIFICATE and END CERTIFICATE delimiters. Do not copy the BEGIN CERTIFICATE and END CERTIFICATE from certificate field.
  7. In the Default Roles section, select the roles to grant to new users of the SAML-enabled controller by checking the Member check box for the role.  You must grant at least one default role, and you can select multiple roles. See Configure Roles for information about roles and permissions.
    The roles that you assign here will be granted to new users when they first log in to the SAML-enabled controller if those users have not been previously created directly in the Controller. Users created prior to SAML enablement or directly within the controller prior to the user's initial login retain their original roles.
    Typically SAML users get the default roles assigned in this configuration. In exceptional cases an account owner may want to grant individual users different roles. See To Assign A Role to a User.
  8. Click Save.

Use Automated SAML Groups and Controller User Role Associations

The Controller can assign roles to SAML-authenticated from attributes drawn from the SAML identity assertion for the user. The Controller takes the group name from the user identity assertion from SAML and matches it to the role with the same name defined in the Controller configuration.

To use automated mapping between SAML group and Controller role:

As an example, given the following SAML assertion, the Controller would map the "Workflow Executor" and "CartAppAdmin" group names to the identically named roles in the Controller. 

   <saml:Attribute Name="Groups" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic">
      <saml:AttributeValue xsi:type="xs:string">Workflow Executor</saml:AttributeValue>
      <saml:AttributeValue xsi:type="xs:string">CartAppAdmin</saml:AttributeValue>

No additional SAML configuration is required in the Controller to use SAML group-to-role mapping. If SAML authentication is enabled in the Controller, as described in the previous section, it automatically checks SAML assertions for the Groups attribute. 

However, be sure to note the following behavior related to SAML group-to-role mapping: