Support

Loggly SSO – ADFS

Configuration for Loggly Single Sign On (SSO) using ADFS

Provide key ADFS information to Loggly

  1. ADFS entity ID : Typically looks like “http://<customer_domain>/adfs/services/trust”. Can be verified in the metadata at https://<customer_domain>/FederationMetadata/2007-06/FederationMetadata.xml
  2. ADFS SSO endpoint : Typically looks like “https://example.com/adfs/ls”,
  3. Obtain the ADFS certificate (public key) in .pem (Base64 encoded) format. The necessary certificate is the “Token Signing” certificate (in ADFS admin UI)

At this point Loggly will create an SSO configuration for your subdomain, and notify you when it’s possible to move on to “Add RP trust”.

Provide group mapping information to Loggly

Loggly controls user access through ADFS via mappings from Active Directory group memberships. In order to access the product, each user must be a member of at least one mapped group. Groups may map to one of two privilege levels, “user” or “administrator”. A user belonging to multiple groups will receive the highest privileges among any of their groups.

If you don’t wish to provide this information, we will use the following default mapping:

Group Name

Privilege

Loggly Users user
Loggly Admins administrator

Add RP trust

  1. In the ADFS management snap-in, go to “Relying Party Trusts” > “Add relying party trust…”. Click through to “Select Data Source”
  2. Select the first radio button (“Import data […] published online or on a local network”) and input <customer subdomain>.<loggly environment>/sso/saml/metadata. Alternatively, open that URL in a browser, download the XML, and import it using the second radio button (“[…] from a file”). Click next.
  3. Choose a display name. Click next.
  4. Select “Permit all users[…]”. Click next.
  5. Click next.
  6. Make sure “Open the Edit Claim Rules dialog[…]” is checked. Click finish.

Add claim rule

  1. Click Add Rule
  2. Select “Send LDAP Attributes as Claims”
  3. Select a name for the rule (like “Loggly required data”)
  4. Under “Attribute Store” choose “Active Directory”
  5. Create the following mappings using the dropdowns below (See figure below):
    1. User-Principle-Name -> Name ID
    2. Surname -> lastname
    3. Given-Name -> firstname
    4. E-Mail-Addresses -> emails
    5. Token-Groups – Unqualified Names -> groups
  6. Click Finish.
Thanks for the feedback! We'll use it to improve our support documentation.