Information on setting up Azure AD as an IdP for AWS Managed Grafana. This explains how to set up Admin, Viewer, and
-
Perform steps 1-10 from this document
-
Under the Azure Enterprise Application, click "Single sign-on" from the left-hand nav bar
-
Edit the "Attributes & Claims"
-
Click "Add a group claim"
- select the radio button for "Security groups"
- Source attribute = "Group ID"
- Expand "Advanced Options"
- Check "Filter groups"
- Attibute to match = "Display name"
- Match with = "Contains"
- String = "Grafana" -> This could change depending on your needs
- Check "Customize the name of the group claim"
- Name = "role" -> This can be anything that doesn't collide with another attribute
- Check "Filter groups"
-
Create Azure groups and assign users to them
- In this example, you could create
Grafana_Admin
,Grafana_Editor
,Grafana_Viewer
- In this example, you could create
-
In Grafana, set the "assertion attribute role" to whatever you set the name of the group claim to ("role" in this example)
-
Role values must be the Azure Object ID(s) of the group(s)
- In this example, you'd set the Grafana Admin role to the Object ID of the
Grafana_Admin
group, the Grafana Editor role gets set to the Object ID of theGrafana_Editor
group, and Grafana Viewer gets set to the Object ID of theGrafana_Viewer
group
- In this example, you'd set the Grafana Admin role to the Object ID of the