cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Is there a way to change SAML authentication to local authentication from a configuration file in Dynatrace?

james_mayers
Newcomer

Is there a way to change SAML authentication to local authentication from a configuration file in Dynatrace?


14 REPLIES 14

gerald_holl
Dynatrace Mentor
Dynatrace Mentor

Hello, you can disable it with a switch in the UI. Not via config file.

See https://www.dynatrace.com/support/help/how-to-use...

Gerald


So, if something went wrong with SAML, and user are not able to login to the UI, there isn't away to switch the authentication back from a config file ?


I raised a support ticket for exactly this problem over a month ago but never received a useful answer (case is still open).


Hello, the doc says to use a non-federated user so that you can change it in case something goes wrong.

Gerald


Curiously, how would I be able to log on using a non-federated user if "SSO" was selected in the CMC under "Home > Users > Single sign on settings" (effectively disabling the login mask) and there was a failure with the SAML authentication service?

Besides, I don't see an option for inviting users on our Dynatrace Manage instance (as suggested in the doc). Is this an exclusive SaaS feature?


As a title says - this doc page refers to SaaS.


For Managed you can only use embedded ‘admin’ account to bypass SSO. Unless you have configured “SSO only”. If that is the case - the only option is to use REST API call to change authentication method or Create a support ticket so we can reset your configuration.


Can you share the API call needed to perform this change in authentication method? I'm hesitant to utilize SSO until we have a way to get back into the system if the SAML service is broken. Having an API call to switch it would work.


That would be calling

/api/v1/onpremise/userRepository/authenticationMode

on the Cluster Management API with the following JSON content body in a POST request:

{  "authenticationProvider": "INTERNAL" }

To revert back to SSO you can do the same with:

{  "authenticationProvider": "LDAP" }

HTH


So I tried this and it did not work as expected. The issue is actually around the "Select login page". When I change this to SSO only so that the users are directed to SSO, I'm not seeing a way to change this back to a login prompt in case SAML SSO is unavailable. I tried using the API commands above but no matter if it's set to Internal or LDAP, if I had set the login page to use SSO only, it continues to redirect to the SAML provider. Is there a different API call that will allow me to change the Login Page? This is the real crux of my issue.


Radoslaw_Szulgo
Dynatrace Leader
Dynatrace Leader

1. To get the current configuration:

GET /api/v1/onpremise/sso/ssoProvider

Example:

curl -X GET "https://<yourClusterHosname>/api/v1.0/onpremise/sso/ssoProvider?Api-Token=<Api-Token>" -H  "accept: application/json"

2. To update config:

POST /api/v1.0/onpremise/sso/ssoProvider

Example:

curl -X POST "https://<yourClusterHosname>/api/v1.0/onpremise/sso/ssoProvider?Api-Token=<Api-Token>" -H  "accept: application/json" -H "Content-Type: application/json"

And payload:

{"ssoProvider":"NONE","loginPage":"STANDARD","ssoEnabled":false,"ssoGroupsEnabled":false,"ssoLoginDisabled":true}

That looks promising, however on my system (version 1.168), I'm receiving an HTTP 404 for that API function. I also don't see it listed under the Cluster API page. What version is required for this functionality? This is EXACTLY what I'm looking for so I'm glad it appears that it exists and is coming.


sorry - misspellig. My answer updated


I didn't catch the v1 versus v1.0. This works perfectly! I can now comfortably move to SSO login knowing that we can revert if needed. Thanks so much.