IBM Instana Self-hosted Standard IdP
Technical guide on how to prepare your IBM Instana Self-hosted Standard backend to be ready to enable authetication using IdPs, this is the first step if you want to have authetication using SAML or OID.
Table of contents
- Purpose of this guide and pre-requisites
- IBM Documentation references
- Do the Group Mapping
- SAML is not enabled in the UI! How can I enabled it?
- Creating an Identity Service Provider key and certificate for IdP configuration
- Configure a Service Provider in IBM Instana
- Refresh the Instana UI
- What next?
- What if I can’t login with the IdP?
Purpose of this guide and pre-requisites
The purpose is to teach you step-by-step how to prepare your backend to connect Identity Service Providers (IdPs).
I’m stitching things together from several places and make it work for Self-hosted Standard, if you see any issue in this guide please contact the Author (About page). As usual, this guide has been tested personally and with customers.
This guide asumes you’re using the Instana Self-hosted backend version >= 1.8.0
IBM Documentation references
All information comes from all these IBM Instana Official documentation references:
Configuring Service Provider (SAML)
Do the Group Mapping
It’s recommended to read how IdP works as you want to have your Groups mapped before enabling authentication, why? because that’s the only authentication method IBM Instana is going to recognize going forward, read the following first:
SAML is not enabled in the UI! How can I enabled it?
This is one of the first questions I get from my customers, it’s not a hidden standard edition feature, our Instana documentation has the information but this step-by-step guide will make your life easier and faster.
When you login to the IBM Instana UI and go to Settings-> “Security & Access” you’re NOT going to see SAML or OID, to enable it you need to create an Identity Service Provider key and certificate, and then apply that to the Instana backend.
Creating an Identity Service Provider key and certificate for IdP configuration
In case you don’t have a key and certificate already.
To enable SAML/OID, we need a key and a certificate, you need to run these commands in your Self-hosted Standard host, and save the data in a safe location.
Connect to your IBM Instana backend server.
Generate a private key
openssl genrsa -aes128 -out sp_key.pem 2048
Example:
[root@itz idp]# openssl genrsa -aes128 -out sp_key.pem 2048
Enter PEM pass phrase:
Verifying - Enter PEM pass phrase:
[root@itz idp]#
You are going to be prompted for a passphrase.
Make sure to remember this passphrase since you’ll need it later on to provide it as the
key_pass
value.
Generate a self-signed certificate by using the private key.
openssl req -new -x509 -key sp_key.pem -out sp_cert.pem -days 365
Fill out the CSR (Certificate Signing Request) information as prompted. Make sure to enter the same information that you used when you generated the private key. I guess the documentation here refers to the Passphrase.
Example:
[root@itz idp]# openssl req -new -x509 -key sp_key.pem -out sp_cert.pem -days 365
Enter pass phrase for sp_key.pem:
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [XX]:SE
State or Province Name (full name) []:Stockholm
Locality Name (eg, city) [Default City]:Stockholm
Organization Name (eg, company) [Default Company Ltd]:IBM
Organizational Unit Name (eg, section) []:CSM
Common Name (eg, your name or your server's hostname) []:
Email Address []:
Combine the certificate and key into one PEM file.
cat sp_key.pem sp_cert.pem > sp_key_cert.pem
Make sure to store the
sp_key_cert.pem
file in a safe location.
Configure a Service Provider in IBM Instana
stanctl backend apply --core-service-provider-password PEMPASSWORD --core-service-provider-pem /path/to/secure/idp/sp_key_cert.pem
Example:
[root@itz idp]# stanctl backend apply --core-service-provider-password MyAwesomeRandomPass --core-service-provider-pem /path/to/secure/idp/sp_key_cert.pem
⠏ Fetching supported Instana versions [2s] ✓
⠧ Adding Instana Helm repo [15s] ✓
⠦ Applying backend apps [39s] ✓
⠋ Waiting for Core/instana-core [0s] ✓
⠋ Waiting for Unit/instana-unit [0s] ✓
****************************************************************
* Successfully installed Instana Self-Hosted Standard Edition! *
* *
* URL: https://itz-instana.ibm.com *
* Username: admin@instana.local *
****************************************************************
Refresh the Instana UI
Refresh the Instana UI or click around and then go to Settings-> “Security & Access”, you are going to see the SAML and OpenID options:
What next?
Don’t forget to perfom the IdP Group Mapping first, then you can enable your Service Provider:
Active Directory OKTA OneLogin KeyCloak
What if I can’t login with the IdP?
After SAML/OID is activated for your IBM Instana backend, you have no other way to login to Instana.
But fear not, the IdP configuration can be reset
stanctl auth reset-idp
Then you can try to setup the service again.