Table of Contents

Configuring SAML settings

If you want to configure your DataMiner System to use external authentication, the best way to do so is using SAML (Security Assertion Markup Language).

To configure SAML, you will first need to set up authentication. For this, you need to generate a metadata file for the service provider (i.e., DataMiner) and a metadata file for the identity provider, and DataMiner and the identity provider need to exchange metadata files. This way, a trust relationship between the two is established. The following metadata must be shared between DataMiner and the identity provider service: Entity ID, Cryptographic Keys, Protocol Endpoints (bindings, locations). Once this is done, you then need to configure user provisioning.

You can find detailed information about this configuration for the different supported identity providers here:

Once everything has been correctly configured, if users try to log in to the DMA using external authentication via SAML, they will be redirected to a login page of the identity provider. That page will authenticate them and return a SAML response, which DataMiner will use to either grant or deny access.

Please note the following:

  • Any DataMiner Agent configured for SAML external authentication must be accessible via HTTPS.

  • DataMiner integrates with identity providers using version 2.0 of the SAML protocol. Compatibility with older SAML versions is not supported. In addition, the identity provider must support redirect binding for communication between the service provider (i.e., DataMiner) and the identity provider. Most SAML identity providers support redirect binding by default.

  • DataMiner uses service provider-initiated Single Sign-On (SSO) through redirect binding. It does not support the use of POST or SOAP binding for requests. However, standard POST binding is used for responses.

    Tip

    For a comprehensive understanding of the SAML process, including the encoding and encryption guidelines that DataMiner follows, refer to the official SAML Documentation: SAML Technical Overview.

  • Only one application registration is needed on the identity provider per cluster registration.

  • The DataMiner.xml configuration must be exactly the same for all SAML Agents in a cluster. This configuration is not synced automatically in the cluster; it needs to be set manually for each Agent.

  • DataMiner will expect one of the claims provided by the identity provider to be the "name" claim: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name. This field must contain either the username or the email address.

  • If a default username is not in email format or if DataMiner is unable to locate it, add a <PreferredEmailClaim> element to the <AutomaticUserCreation> element in DataMiner.xml that refers to a claim containing a valid email address tag. See Configuring DataMiner.xml to use external authentication.

  • If there are two DataMiner users who share the same email address, both users will not be able to log in. To prevent this from happening, we recommended not using more than one method to add users. For example, do not add Windows domain users if the Entra ID users use the same email address.

  • To use external authentication for DataMiner Low-Code Apps, you must use DataMiner 10.3.5 or higher.

  • For DataMiner Cube, it is possible to bypass the external authentication provider by entering an explicit username/password combination. However, prior to DataMiner 10.1.11/10.2.0, this is only possible for the Administrator user.

  • For the Web apps:

    • From DataMiner web 10.5.0 [CU10]/10.6.1 onwards, when external authentication is enabled, but you want to sign in with a local user, add the skipAutoLogin=true argument to the URL of the app. You will then be able to choose between signing in using an identity provider or a local account. Once you are signed in using external authentication, you can still authenticate with a local user using the Sign in with another user option in the user menu.

    • Prior to DataMiner web 10.5.0 [CU10]/10.6.1, when external authentication is enabled, it is not possible to log in with local accounts. As a workaround, since you do not need to configure external authentication on every DMA of the cluster, you can log in to the web apps using external authentication on one DMA and log in using a local account on another DMA.