|
| 1 | +--- |
| 2 | +mapped_pages: |
| 3 | + - https://www.elastic.co/guide/en/elasticsearch/plugins/current/ms-graph-authz-configure-elastic.html |
| 4 | +--- |
| 5 | + |
| 6 | +# Configuration properties [configuration-properties] |
| 7 | + |
| 8 | +Once the plugin is installed, the following configuration settings are available: |
| 9 | + |
| 10 | +`xpack.security.authc.realms.microsoft_graph.*.order` |
| 11 | +: The priority of the realm within the realm chain. Realms with a lower order are consulted first. The value must be unique for each realm. This setting is required. |
| 12 | + |
| 13 | +`xpack.security.authc.realms.microsoft_graph.*.tenant_id` |
| 14 | +: Your Microsoft Entra ID [Tenant ID](https://learn.microsoft.com/en-us/entra/fundamentals/how-to-find-tenant). This setting is required. |
| 15 | + |
| 16 | +`xpack.security.authc.realms.microsoft_graph.*.client_id` |
| 17 | +: The Application ID of the Enterprise Application you registered in the previous section. This setting is required. |
| 18 | + |
| 19 | +`xpack.security.authc.realms.microsoft_graph.*.client_secret` |
| 20 | +: The client secret value for the Application you registered in the previous section. This is a sensitive setting, and must be configured in the Elasticsearch keystore. This setting is required. |
| 21 | + |
| 22 | +`xpack.security.authc.realms.microsoft_graph.*.access_token_host` |
| 23 | +: A Microsoft login URL. This is optional, and defaults to `https://login.microsoftonline.com`. |
| 24 | + |
| 25 | +`xpack.security.authc.realms.microsoft_graph.*.graph_host` |
| 26 | +: The Microsoft Graph base address. This is optional, and defaults to `https://graph.microsoft.com/v1.0`. |
| 27 | + |
| 28 | +`xpack.security.authc.realms.microsoft_graph.*.http_request_timeout` |
| 29 | +: The timeout for individual Graph HTTP requests. This setting is optional, and defaults to `10s`. |
| 30 | + |
| 31 | +`xpack.security.authc.realms.microsoft_graph.*.execution_timeout` |
| 32 | +: The overall timeout for authorization requests to this plugin. This setting is optional, and defaults to `30s`. |
| 33 | + |
| 34 | +Create a Microsoft Graph realm, following the above settings, then configure an existing realm to delegate to it using `authorization_realms`. |
| 35 | + |
| 36 | +For example, to authenticate via Microsoft Entra with SAML and use the Microsoft Graph plugin to look up group membership: |
| 37 | + |
| 38 | +```yaml |
| 39 | +xpack.security.authc.realms.saml.kibana-realm: |
| 40 | + order: 2 |
| 41 | + attributes.principal: nameid |
| 42 | + attributes.groups: "http://schemas.microsoft.com/ws/2008/06/identity/claims/groups" |
| 43 | + idp.metadata.path: "https://login.microsoftonline.com/<Tenant ID>/federationmetadata/2007-06/federationmetadata.xml?appid=<Application_ID>" |
| 44 | + idp.entity_id: "https://sts.windows.net/<Tenant_ID>/" |
| 45 | + sp.entity_id: "<Kibana_Endpoint_URL>" |
| 46 | + sp.acs: "<Kibana_Endpoint_URL>/api/security/saml/callback" |
| 47 | + sp.logout: "<Kibana_Endpoint_URL>/logout" |
| 48 | + authorization_realms: microsoft_graph1 |
| 49 | + |
| 50 | +xpack.security.authc.realms.microsoft_graph.microsoft_graph1: |
| 51 | + order: 3 |
| 52 | + tenant_id: "<Tenant_ID>" |
| 53 | + client_id: "<Graph_Application_ID>" |
| 54 | +``` |
0 commit comments