Copyright © 2016–2025 InsightFinder. All Rights Reserved.
Unified Intelligence Engine - UIE
InsightFinder Unified Intelligence Engine (UIE) platform leverages our advanced AI to seamlessly integrate and analyze diverse data sources, delivering actionable insights for optimal decision-making.
Our platform expertly integrates with leading observability solutions and open source monitoring tools, ensuring a comprehensive and versatile approach to achieving AI-driven self-healing and self-optimizing.
Summary of InsightFinder AI's quarterly product release updates.
Manage your AI models to detect and prevent model drift, ensure accuracy, and deliver performance.
Precise anomaly detection with threshold-less alerts, root cause analysis, incident prediction, and automated remediation to ensure continued service delivery.
InsightFinder supports SAML 2.0 by adding one additional SAML relay service to process all SSO requests from all kinds of IdPs like Microsoft Entra ID and Teleport.
1.Transfer the files for SAML Relay Service
cp downloads/saml.jar /
cp downloads/application.yml
2.Start the service with a configuration
java -jar saml.jar \ --spring.config.location=file:./application.yml
1.Generate certificates for Service Provider
openssl req -newkey rsa:2048 -nodes -keyout sp.key -x509 -days 365 -out sp.crt
2.Update the basic configuration part in application.yml.
Item | Description | Example Value |
---|---|---|
server.port | The port you want this service listens to. | 8080 |
insight-finder.serverUrl | The URL for InsightFinder engine. | https://app.insightfinder.com |
insight-finder.samlUrl | The full url for this SAML relay service. | https://saml.insightfinder.com:8080 |
insight-finder.sp-key | The path to the ServiceProvider key generated in step 1 | /app/certs/sp.key |
insight-finder.sp-cert | The path to the ServiceProvider certificate generated in step 1 | /app/certs/sp.crt |
3.Update the Identity Provider part saml.idp.your-idp in application.yml
Item | Description | Example Value |
---|---|---|
entity-id | The url to the SAML 2.0 metadata xml. | https://xxx.teleport.sh/enterprise/saml-idp/metadata |
firstname-key | The field name in the SAML principal that represents the user’s first name | http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname |
lastname-key | The field name in the SAML principal that represents the user’s last name | http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname |
email-key | The field name in the SAML principal that represents the user’s email address | http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress |
singlesignon-url | The URL of the Identity Provider's SAML 2.0 SSO service | https://xxx.teleport.sh/enterprise/saml-idp/sso |
idp-cert | The path of the certificate from the Identity Provider | /app/certs/SAML-IDP-X509.pem |
4.Register the SAML relay service in InsightFinder engine:
vi /opt/jetty/webapp/ROOT/WEB-INF/classes/saml.json
Add one entry to map all email address end with @examplecompany.com to this SAML relay service
"@examplecompany.com": "https:///saml2/authenticate/"
Attribute Name | Attribute Name Format | Attribute Value |
---|---|---|
firstname | unspecified | user.spec.traits.firstname |
lastname | unspecified | user.spec.traits.lastname |
unspecified | user.spec.traits.email |
Take InsightFinder AI for a no-obligation test drive. We’ll provide you with a detailed report on your outages to uncover what could have been prevented.