Integrate FusionAuth with Elastic Cloud
- 
 Hi Everyone, I am trying to integrate FusionAuth(v1.23.2) as Identity Provider to my Elastic Cloud(v7.10.2). I configure the Application (SAML) on the FusionAuth side and adding some config changes to my elastic cloud (creating realm with name saml1): elasticsearch.yaml xpack: security: authc: realms: saml: saml1: attributes.principal: "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress" attributes.groups: "roles" idp.entity_id: "xxx" idp.metadata.path: "xxx" order: 2 sp.acs: "xxx/api/security/v1/saml" sp.entity_id: "xxx/" sp.logout: "xxx/logout"kibana.yaml xpack.security.authc.providers: saml.saml1: order: 0 realm: saml1 description: "Log in with SAML" basic.basic1: order: 1The login via SAML failed and give me this error on Kibana side {"statusCode":401,"error":"Unauthorized","message":"[security_exception] unable to authenticate user [<unauthenticated-saml-user>] for action [cluster:admin/xpack/security/saml/authenticate], with { header={ WWW-Authenticate={ 0=\"Basic realm=\\\"security\\\" charset=\\\"UTF-8\\\"\" & 1=\"Bearer realm=\\\"security\\\"\" & 2=\"ApiKey\" } } }"}And, I'm finding the error on the FusionAuth side related to the NameID The SAML AuthnRequest was invalid and/or did not pass validation. The error code is [InvalidNameIDPolicy] and the error message is [The AuthnRequest contained an invalid NameId policy. FusionAuth only supports the [urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress] or [urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified] policy]Is there anyone facing some problem? 
- 
 What NameIdPolicyoptions does Kibana support?
- 
 @robotdan said in Integrate FusionAuth with Elastic Cloud: NameIdPolicy By referring to this documentation https://www.elastic.co/guide/en/elasticsearch/reference/master/saml-guide-authentication.html#saml-attribute-mapping, It's only mentioned nameid, nameid:persistent and friendlyName. 
- 
 Likely the same issue as described here https://github.com/FusionAuth/fusionauth-issues/issues/522 
- 
 Got it. So, currently it's only support urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddressfrom FusionAuth side, right?
- 
 I believe that is correct. https://github.com/FusionAuth/fusionauth-issues/issues/522#issuecomment-685851566 @dan do we have this limitation documented anywhere that you know of? @vexana you can add a comment to that issue if you want to mention it also impacts integration with Elasticsearch SAML authentication. If Elasticsearch supports OpenID Connect, that may be an option for you. 
- 
 @robotdan no, we don't. I'll document that in the https://fusionauth.io/docs/v1/tech/reference/limitations/ section. 
- 
 Looks like you can also integrate to elastic cloud using OIDC: https://discuss.elastic.co/t/elastic-cloud-integration-with-fusionauth/263323 
- 
 @dan Yap, I am the same person asking about that. I am asking on the elastic forum about the OIDC. Currently, still having a problem integrating it. (I'll update on here also if finding the solution). 
- 
 @vexana It seems like you succeeded based on the last post. Is that the case? 
- 
 @vexana succeeded, but had another question, so I forked the topic: https://fusionauth.io/community/forum/topic/811/mapping-fusionauth-roles-to-elasticsearch 

