このページは日本語には対応しておりません。随時翻訳に取り組んでいます。
翻訳に関してご質問やご意見ございましたら、
お気軽にご連絡ください。
Overview
With Datadog, you can map attributes in your Identity Provider (IdP)’s response to Datadog entities.
You can map attributes to the following principals:
Users with the Access Management permission can assign or remove Datadog principals based on a user’s SAML-assigned attributes.
Setting up a mapping from SAML attributes to Datadog entities allows you to manage users solely in your identity provider. The system then provisions users in Datadog according to the mappings you set up.
Prerequisites
It’s important to understand what is sent in an assertion before turning on mappings, as mappings require correct attributes. Every IdP has specific mappings. For example, Azure works with object IDs, and Okta requires you to set attributes in Okta settings. Datadog recommends cross-referencing with built-in browser tooling such as Chrome DevTools or browser extensions and validating your SAML assertions before creating mappings.
Map SAML attributes to Datadog roles
Cross-reference and validate your SAML assertion to understand your IdP’s attributes.
Go to Organization Settings and click the SAML Group Mappings tab.
If it is visible, ensure the Role Mappings tab is selected.
Click New Mapping. A dialog box appears.
Specify the SAML identity provider key-value
pair that you want to associate with an existing Datadog role (either default or custom). Note: These entries are case-sensitive.
For example, if you want all users whose member_of
attribute has a value of Development
to be assigned to a custom Datadog role called Devs
:
Note: Every identity provider is different. Some allow you to set your attribute key or label. Others provide one by default. Datadog recommends you use an assertion inspector on your login to view the details of your particular assertion to understand how your Identity Provider is sending your group membership.
If you have not already done so, enable mappings by clicking Enable Mappings.
When a user logs in who has the specified identity provider attribute, they are automatically assigned the Datadog role. Likewise, if someone has that identity provider attribute removed, they lose access to the role (unless another mapping adds it).
Important: If a user does not match any mapping, they lose any roles they had previously and are prevented from logging into the org with SAML. Double-check your mapping definitions and inspect your own assertions before enabling Mappings to prevent any scenarios where your users are unable to login.
Make changes to a mapping by clicking the pencil (Edit) icon, or remove a mapping by clicking the garbage (Delete) icon. These actions affect only the mapping, not the identity provider attributes or the Datadog roles.
Alternatively, you can create and change mappings of SAML attributes to Datadog roles with the authn_mappings
endpoint. For more information, see Federated Authentication to Role Mapping API.
Map SAML attributes to Teams
- Ensure you selected either SAML or All sources when choosing your provisioning source for team memberships.
- Cross-reference and validate your SAML assertion to understand your IdP’s attributes.
- Go to Organization Settings and click the SAML Group Mappings tab.
- Ensure the Team Mappings tab is selected.
- Click New Mapping. A dialog box appears.
- Specify the SAML identity provider
key-value
pair that you want to associate with a Datadog Team. Note: These entries are case-sensitive.
Note: Every identity provider is different. Some allow you to set your attribute key or label. Others provide one by default. Datadog recommends you use an assertion inspector on your login to view the details of your particular assertion to understand how your Identity Provider is sending your group membership. - Select a Team from the dropdown menu.
- To add an additional mapping, click Add Row.
- When you are done adding mappings, click Create.
- If you have not already done so, enable mappings by clicking Enable Mappings.
Make changes to a mapping by clicking the pencil (Edit) icon, or remove a mapping by clicking the garbage (Delete) icon. These actions affect only the mapping, not the identity provider attributes or the Datadog Team.
Note: Unlike Roles, Teams do not affect the login experience in any way. Datadog uses Team mapping purely as a provisioning source. For example, when a user does not belong to any Teams, they can still sign in to Datadog.