07 May 2019 09:05 PM
Is there a way to change SAML authentication to local authentication from a configuration file in Dynatrace?
Solved! Go to Solution.
08 May 2019 09:08 AM
Hello, you can disable it with a switch in the UI. Not via config file.
See https://www.dynatrace.com/support/help/how-to-use...
Gerald
08 May 2019 04:24 PM
So, if something went wrong with SAML, and user are not able to login to the UI, there isn't away to switch the authentication back from a config file ?
09 May 2019 07:43 AM
I raised a support ticket for exactly this problem over a month ago but never received a useful answer (case is still open).
09 May 2019 07:48 AM
Hello, the doc says to use a non-federated user so that you can change it in case something goes wrong.
Gerald
09 May 2019 08:02 AM
Curiously, how would I be able to log on using a non-federated user if "SSO" was selected in the CMC under "Home > Users > Single sign on settings" (effectively disabling the login mask) and there was a failure with the SAML authentication service?
Besides, I don't see an option for inviting users on our Dynatrace Manage instance (as suggested in the doc). Is this an exclusive SaaS feature?
15 May 2019 09:36 PM
As a title says - this doc page refers to SaaS.
For Managed you can only use embedded ‘admin’ account to bypass SSO. Unless you have configured “SSO only”. If that is the case - the only option is to use REST API call to change authentication method or Create a support ticket so we can reset your configuration.
06 Jun 2019 01:32 PM
Can you share the API call needed to perform this change in authentication method? I'm hesitant to utilize SSO until we have a way to get back into the system if the SAML service is broken. Having an API call to switch it would work.
06 Jun 2019 04:21 PM
That would be calling
/api/v1/onpremise/userRepository/authenticationMode
on the Cluster Management API with the following JSON content body in a POST request:
{ "authenticationProvider": "INTERNAL" }
To revert back to SSO you can do the same with:
{ "authenticationProvider": "LDAP" }
HTH
10 Jun 2019 06:22 PM
So I tried this and it did not work as expected. The issue is actually around the "Select login page". When I change this to SSO only so that the users are directed to SSO, I'm not seeing a way to change this back to a login prompt in case SAML SSO is unavailable. I tried using the API commands above but no matter if it's set to Internal or LDAP, if I had set the login page to use SSO only, it continues to redirect to the SAML provider. Is there a different API call that will allow me to change the Login Page? This is the real crux of my issue.
21 Nov 2019 07:42 AM - last edited on 16 Oct 2023 03:36 PM by random_user
It seems this is now possible using the /admin backdoor.
10 Jun 2019 08:29 PM
1. To get the current configuration:
GET /api/v1/onpremise/sso/ssoProvider
Example:
curl -X GET "https://<yourClusterHosname>/api/v1.0/onpremise/sso/ssoProvider?Api-Token=<Api-Token>" -H "accept: application/json"
2. To update config:
POST /api/v1.0/onpremise/sso/ssoProvider
Example:
curl -X POST "https://<yourClusterHosname>/api/v1.0/onpremise/sso/ssoProvider?Api-Token=<Api-Token>" -H "accept: application/json" -H "Content-Type: application/json"
And payload:
{"ssoProvider":"NONE","loginPage":"STANDARD","ssoEnabled":false,"ssoGroupsEnabled":false,"ssoLoginDisabled":true}
10 Jun 2019 09:24 PM
That looks promising, however on my system (version 1.168), I'm receiving an HTTP 404 for that API function. I also don't see it listed under the Cluster API page. What version is required for this functionality? This is EXACTLY what I'm looking for so I'm glad it appears that it exists and is coming.
11 Jun 2019 09:03 AM
sorry - misspellig. My answer updated
11 Jun 2019 02:25 PM
I didn't catch the v1 versus v1.0. This works perfectly! I can now comfortably move to SSO login knowing that we can revert if needed. Thanks so much.