From d6f4246f773ed52e6f9bd54899f2791875714743 Mon Sep 17 00:00:00 2001 From: Misi Date: Mon, 23 Sep 2024 17:16:53 +0200 Subject: [PATCH] Docs: Update SAML docs (#93379) SAML docs update --- .../configure-authentication/saml/index.md | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/docs/sources/setup-grafana/configure-security/configure-authentication/saml/index.md b/docs/sources/setup-grafana/configure-security/configure-authentication/saml/index.md index 269d6578eca..bddba3548cd 100644 --- a/docs/sources/setup-grafana/configure-security/configure-authentication/saml/index.md +++ b/docs/sources/setup-grafana/configure-security/configure-authentication/saml/index.md @@ -209,11 +209,10 @@ In order to validate Azure AD users with Grafana, you need to configure the SAML 1. In the Set up **Single Sign-On with SAML** pane, select the pencil icon for **Basic SAML Configuration** to edit the settings. 1. In the **Basic SAML Configuration** pane, click on the **Edit** button and update the following fields: - In the **Identifier (Entity ID)** field, enter `https://localhost/saml/metadata`. - - In the **Identifier (Entity ID)** field, remove the default value. - In the **Reply URL (Assertion Consumer Service URL)** field, enter `https://localhost/saml/acs`. - - In the **Sign on URL** field, enter `https://localhost/saml/auth`. - - In the **Relay State** field, enter `https://localhost/saml/slo`. - - In the **Logout URL** field, enter `https://localhost/logout`. + - In the **Sign on URL** field, enter `https://localhost`. + - In the **Relay State** field, enter `https://localhost`. + - In the **Logout URL** field, enter `https://localhost/saml/slo`. 1. Select **Save**. 1. At the **SAML Certificate** section, copy the **App Federation Metadata Url**. - Use this URL in the `idp_metadata_url` field in the `custom.ini` file.