このページは、まだ日本語ではご利用いただけません。翻訳中です。
古いプラグインバージョンのドキュメントを閲覧しています。
構成
このプラグインはDBレスモードに対応しています。
互換性のあるプロトコル
SAMLプラグインは以下のプロトコルに対応しています:
grpc, grpcs, http, https
パラメータ
このプラグインの設定で使用できるすべてのパラメータのリストは次のとおりです。
-
name or plugin
string requiredプラグイン名。この場合は
saml。- Kong Admin API、Kong Konnect API、宣言型構成、または decK ファイルを使用する場合、フィールドは
nameです。 - Kubernetes で KongPlugin オブジェクトを使用する場合、フィールドは
pluginです。
- Kong Admin API、Kong Konnect API、宣言型構成、または decK ファイルを使用する場合、フィールドは
-
instance_name
stringプラグインのインスタンスを識別するための任意のカスタム名 (例:
saml_my-service。インスタンス名はKong ManagerとKonnectに表示されるので、 例えば複数のサービスで同じプラグインを複数のコンテキストで実行する場合に便利です。また、Kong Admin API経由で特定のプラグインインスタンスに アクセスするためにも使用できます。
インスタンス名は、次のコンテキスト内で一意である必要があります。
- Kong Gateway Enterpriseのワークスペース内
- Konnectのコントロールプレーン(CP)またはコントロールプレーン(CP)グループ内
- Kong Gateway (OSS)の全世界
-
service.name or service.id
stringプラグインが対象とするサービス名または ID。最上位の
/pluginsエンドポイント. からプラグインをサービスに追加する場合は、これらのパラメータのいずれかを設定してください/services/{serviceName|Id}/pluginsを使用する場合は必要ありません。 -
route.name or route.id
stringプラグインがターゲットとするルート名または ID。最上位の
/pluginsエンドポイント. を通るルートにプラグインを追加する場合は、これらのパラメータのいずれかを設定してください/routes/{routeName|Id}/pluginsを使用する場合は必要ありません。 -
enabled
boolean default:trueこのプラグインが適用されるかどうか。
-
config
record required-
assertion_consumer_path
string required starts_with:/A string representing a URL path, such as /path/to/resource. Must start with a forward slash (/) and must not contain empty segments (i.e., two consecutive forward slashes).
-
idp_sso_url
string requiredA string representing a URL, such as https://example.com/path/to/resource?q=search.
-
idp_certificate
string referenceable encryptedThe public certificate provided by the IdP. This is used to validate responses from the IdP. Only include the contents of the certificate. Do not include the header (
BEGIN CERTIFICATE) and footer (END CERTIFICATE) lines.
-
response_encryption_key
string referenceable encryptedThe private encryption key required to decrypt encrypted assertions.
-
request_signing_key
string referenceable encryptedThe private key for signing requests. If this parameter is set, requests sent to the IdP are signed. The
request_signing_certificateparameter must be set as well.
-
request_signing_certificate
string referenceable encryptedThe certificate for signing requests.
-
request_signature_algorithm
string default:SHA256Must be one of:SHA256,SHA384,SHA512The signature algorithm for signing Authn requests. Options available are: -
SHA256-SHA384-SHA512
-
request_digest_algorithm
string default:SHA256Must be one of:SHA256,SHA1The digest algorithm for Authn requests: -
SHA256-SHA1
-
response_signature_algorithm
string default:SHA256Must be one of:SHA256,SHA384,SHA512The algorithm for validating signatures in SAML responses. Options available are: -
SHA256-SHA384-SHA512
-
response_digest_algorithm
string default:SHA256Must be one of:SHA256,SHA1The algorithm for verifying digest in SAML responses: -
SHA256-SHA1
-
issuer
string requiredThe unique identifier of the IdP application. Formatted as a URL containing information about the IdP so the SP can validate that the SAML assertions it receives are issued from the correct IdP.
-
nameid_format
string default:EmailAddressMust be one of:Unspecified,EmailAddress,Persistent,TransientThe requested
NameIdformat. Options available are: -Unspecified-EmailAddress-Persistent-Transient
-
validate_assertion_signature
boolean default:trueEnable signature validation for SAML responses.
-
anonymous
stringAn optional string (consumer UUID or username) value to use as an “anonymous” consumer. If not set, a Kong Consumer must exist for the SAML IdP user credentials, mapping the username format to the Kong Consumer username.
-
session_secret
string required referenceable encrypted matches:^[0-9a-zA-Z/_+]+$len_min:32len_max:32The session secret. This must be a random string of 32 characters from the base64 alphabet (letters, numbers,
/,_and+). It is used as the secret key for encrypting session data as well as state information that is sent to the IdP in the authentication exchange.
-
session_audience
string default:defaultThe session audience, for example “my-application”
-
session_cookie_name
string default:sessionThe session cookie name.
-
session_remember
boolean default:falseEnables or disables persistent sessions
-
session_remember_cookie_name
string default:rememberPersistent session cookie name
-
session_remember_rolling_timeout
number default:604800Persistent session rolling timeout in seconds.
-
session_remember_absolute_timeout
number default:2592000Persistent session absolute timeout in seconds.
-
session_idling_timeout
number default:900The session cookie idle time in seconds.
-
session_rolling_timeout
number default:3600The session cookie absolute timeout in seconds. Specifies how long the session can be used until it is no longer valid.
-
session_absolute_timeout
number default:86400The session cookie absolute timeout in seconds. Specifies how long the session can be used until it is no longer valid.
-
session_cookie_path
string default:/starts_with:/A string representing a URL path, such as /path/to/resource. Must start with a forward slash (/) and must not contain empty segments (i.e., two consecutive forward slashes).
-
session_cookie_domain
stringThe session cookie domain flag.
-
session_cookie_same_site
string default:LaxMust be one of:Strict,Lax,None,DefaultControls whether a cookie is sent with cross-origin requests, providing some protection against cross-site request forgery attacks.
-
session_cookie_http_only
boolean default:trueForbids JavaScript from accessing the cookie, for example, through the
Document.cookieproperty.
-
session_cookie_secure
booleanThe cookie is only sent to the server when a request is made with the https:scheme (except on localhost), and therefore is more resistant to man-in-the-middle attacks.
-
session_request_headers
set of typestringMust be one of:id,audience,subject,timeout,idling-timeout,rolling-timeout,absolute-timeout
-
session_response_headers
set of typestringMust be one of:id,audience,subject,timeout,idling-timeout,rolling-timeout,absolute-timeout
-
session_storage
string default:cookieMust be one of:cookie,memcache,memcached,redisThe session storage for session data: -
cookie: stores session data with the session cookie. The session cannot be invalidated or revoked without changing the session secret, but is stateless, and doesn’t require a database. -memcached: stores session data in memcached -redis: stores session data in Redis
-
session_store_metadata
boolean default:falseConfigures whether or not session metadata should be stored. This includes information about the active sessions for the
specific_audiencebelonging to a specific subject.
-
session_enforce_same_subject
boolean default:falseWhen set to
true, audiences are forced to share the same subject.
-
session_hash_subject
boolean default:falseWhen set to
true, the value of subject is hashed before being stored. Only applies whensession_store_metadatais enabled.
-
session_hash_storage_key
boolean default:falseWhen set to
true, the storage key (session ID) is hashed for extra security. Hashing the storage key means it is impossible to decrypt data from the storage without a cookie.
-
session_memcached_prefix
stringThe memcached session key prefix.
-
session_memcached_socket
stringThe memcached unix socket path.
-
session_memcached_host
string default:127.0.0.1The memcached host.
-
session_memcached_port
integer default:11211between:065535An integer representing a port number between 0 and 65535, inclusive.
-
session_redis_prefix
stringThe Redis session key prefix.
-
session_redis_socket
stringThe Redis unix socket path.
-
session_redis_host
string default:127.0.0.1The Redis host IP.
-
session_redis_port
integer default:6379between:065535An integer representing a port number between 0 and 65535, inclusive.
-
session_redis_username
string referenceableRedis username if the
redissession storage is defined and ACL authentication is desired.If undefined, ACL authentication will not be performed. This requires Redis v6.0.0+. The username cannot be set todefault.
-
session_redis_password
string referenceable encryptedPassword to use for Redis connection when the
redissession storage is defined. If undefined, no auth commands are sent to Redis. This value is pulled from
-
session_redis_connect_timeout
integerThe Redis connection timeout in milliseconds.
-
session_redis_read_timeout
integerThe Redis read timeout in milliseconds.
-
session_redis_send_timeout
integerThe Redis send timeout in milliseconds.
-
session_redis_ssl
boolean default:falseUse SSL/TLS for the Redis connection.
-
session_redis_ssl_verify
boolean default:falseVerify the Redis server certificate.
-
session_redis_server_name
stringThe SNI used for connecting to the Redis server.
-
session_redis_cluster_nodes
array of typerecordThe Redis cluster node host. Takes an array of host records, with either
iporhost, andportvalues.-
ip
string required default:127.0.0.1A string representing a host name, such as example.com.
-
port
integer default:6379between:065535An integer representing a port number between 0 and 65535, inclusive.
-
-
session_redis_cluster_max_redirections
integerThe Redis cluster maximum redirects.
-
-
session_cookie_lifetime
numberDeprecation notice:
-
session_cookie_idletime
numberDeprecation notice:
-
session_cookie_samesite
stringDeprecation notice:
-
session_cookie_httponly
booleanDeprecation notice:
-
session_memcache_prefix
stringDeprecation notice:
-
session_memcache_socket
stringDeprecation notice:
-
session_memcache_host
stringDeprecation notice:
-
session_memcache_port
integerDeprecation notice:
-
session_redis_cluster_maxredirections
integerDeprecation notice:
-
session_cookie_renew
numberDeprecation notice:
-
session_cookie_maxsize
integerDeprecation notice:
-
session_strategy
stringDeprecation notice:
-
session_compressor
stringDeprecation notice:
-
session_auth_ttl
numberDeprecation notice: