OIDC
The following article exclusively pertains to a Graylog Enterprise feature or functionality. To learn more about obtaining an Enterprise license, please contact the Graylog Sales team.
Graylog supports generic OpenID Connect (OIDC) authentication on-premise, ensuring that your Graylog login can be managed with a variety of OIDC-compliant identity providers.
preferred_username
or email
.
Prerequisites
Required parameters for OIDC providers include:
-
openid
-
profile
-
email
Graylog Supported Identity Providers
These providers have been tested successfully with Graylog; however, you are encouraged to explore authentication with any OIDC-compliant provider that best fits your needs and environment.
Configure a New Identity Service
Navigate to System > Authentication to start the initial authentication process and configure your OIDC protocol.
-
To create a new authentication service, select Create service.
-
To edit an existing service, select the Edit button responding to the service you would like to update.
Authentication Credentials
When creating or editing an authentication service, you are required to enter your authentication credentials on the Authentication Services page. You can obtain these credentials from your identity provider. Navigation of each provider’s application is different and you may need to consider certain specifications when configuring identity providers such as Google and Azure AD .
In the following use case, we guide you through the configuration of an OIDC service with Auth0.
AuthO Use Case
- Log into your existing Auth0 dashboard. You will need to create an application for Graylog.
- Once the Graylog application has been created, select this application in Auth0 to view your client credentials. These credentials will be required to configure your OIDC service in Graylog.
- Navigate to System >Authentication and select Create Service in the Graylog user interface.
- Select OIDC as the service in the drop down menu and click Get Started.
- Use the credentials from Auth0 to fill in the following fields and make your selections, including:
Field | Description |
---|---|
Title |
|
Description |
|
OIDC Base URL |
|
Callback URL |
|
Client ID and Client Secret |
|
Token Verified Connect Timeout |
10 for this field. |
Default Role |
|
6. Select Server Connection Check and Apply. The Server Connection Check allows Graylog to perform a basic consistency and connectivity check of the configuration. Any errors detected at this point will be noted in the UI and must be resolved in order to proceed.
Group Synchronization
Group synchronization is supported with OIDC-compliant identity providers. You can enable group synchronization in the configuration menu while you are setting up your authentication service or by selecting Edit in the Group Synchronization module for an existing authentication service.
-
Select the Synchronize Groups check box to enable the service.
-
Provide a list of group names to be synchronized with Graylog in the Group Claims box. The default value will be set as
graylog_teams
. -
Select Finish & Save Service to being group sync.
Activation
Once you have configured the service, activate your current service provider to enable the authentication protocol. If you change service providers or need to update your settings, be sure to activate the new service from this menu.
Set the Google hd
Claim Authentication Parameter
hd
claim that matches your G Suite domain name. You must set this parameter to restrict access; otherwise, anyone with an authenticated Google account can access your Graylog instance. We strongly recommend restricted access as a best practice for all, but it is especially necessary for self-managed, publicly available Graylog instances.
- To set this authentication parameter, navigate to the Authentication page and select Edit next to your Google authentication service.
- In the Claims menu, add the
hd
claim under Name and provide your organization's domain name in the Value field. - Select Add.
For more information regarding the hd
claim in Google Identity, see the related Google documentation.
Configure the ID Token for Azure AD
If you choose to utilize Azure AD as an identity provider, you will need to customize the information returned by Azure AD during authentication and authorization. Your user email must be included in the ID token to establish a successful connection with Graylog. Follow the steps below to set up the integration:
-
Log into your Azure AD account.
-
Register an application for Graylog.
-
Click Manage in the left sidebar and select Token Configuration.
-
Click Add custom claim and select Token Type: ID.
-
Scroll through the claims list and select email.
-
Click Add.
- Navigate to System >Authentication in the Graylog interface.
- Click on Create Service.
- Select OIDC as the service in the drop down menu and click Get Started.
- Use the credentials from your Azure account to fill in the fields and make your selections.
See the related Microsoft documentation for further information on Azure AD integration.