-
Book Overview & Buying
-
Table Of Contents
Zabbix 6 IT Infrastructure Monitoring Cookbook - Second Edition
By :
In this recipe, we will use SAML authentication, a widely used form of authentication in the IT world. We'll be using this as a form of managing passwords for our Zabbix users. Please note that if you've worked with Zabbix before and you've configured LDAP, SAML, like LDAP, allows user authentication with passwords. You still have to create users with their permissions.
To get started with SAML authentication, we will need our configured Zabbix server from the previous recipe. It's important that we have all the configured users from the previous recipe. We will also need something to authenticate with SAML. We will be using Azure Active Directory (AD) SAML.
Make sure to set up users in your (Azure) AD before continuing with this recipe. You can use your existing AD users for authentication, so you can use this recipe with your existing AD setup.
We will be using the s_network user as an example:
Figure 2.24 – The Azure Users and groups window
These are our user details:
Figure 2.25 – The Azure user details window
To set up SAML, retrieve your SAML settings from your AD or another SAML provider. To work with Zabbix, we will need the following:
Now that we have our Azure AD ready, let's see how we can configure SAML using our setup:
portal.azure.com.
Figure 2.26 – The Azure enterprise application creation page
Zabbix and click on the blue Create button:
Figure 2.27 – The Azure enterprise new application page
s_network:
Figure 2.28 – The Azure enterprise application Users and Groups page
Figure 2.29 – The Azure enterprise application SAML option
Figure 2.30 – The Azure SAML setting 1
Figure 2.31 – The Azure SAML setting 2
Figure 2.32 – The Azure SAML setting 3
vim /usr/share/zabbix/conf/certs/idp.cert
Figure 2.33 – The Azure SAML setting 4
Figure 2.34 – The Zabbix SAML settings
s_network user to include the used Azure domain, for example:
Figure 2.35 – The Zabbix edit user screen for our SAML setup
Figure 2.36 – The Zabbix login window
Zabbix advanced user authentication is used to centralize password management. While we are not able to actually assign user groups and permissions to users via this setup, we can use it for password management.
This way, we can make sure it is easier for users to keep their passwords centralized in medium to big office environments:
Figure 2.37 – Zabbix SAML authentication diagram
Zabbix communicates with our Azure AD SAML component when we click the Sign in button. The user is then authenticated against your Azure AD user and a confirmation is sent back to the Zabbix server. Congratulations, you are now logged in to your Zabbix server!
We can do this kind of authentication not only with SAML but also with HTTP and LDAP. This way, you can choose the right form of advanced authentication for your organization.
Check out the Zabbix documentation for more information on the different forms of authentication:
It's also possible to work with an identity provider such as Okta, OneLogin, or any other. Meaning your options aren't limited to Azure AD, as long as it supports SAML you can use it to authenticate against your Zabbix server.