Copyright © 2016–2024 InsightFinder. All Rights Reserved.
Unified Intelligence Engine - UIE
InsightFinder Unified Intelligence Engine (UIE) platform leverages our advanced AI to seamlessly integrate and analyze diverse data sources, delivering actionable insights for optimal decision-making.
Our portfolio of patents showcases our commitment to innovation and leadership in the field of AI for DevSecOps.
Our platform expertly integrates with leading observability solutions and open source monitoring tools, ensuring a comprehensive and versatile approach to achieving AI-driven self-healing and self-optimizing.
Discover how our customers have transformed their operations and achieved remarkable results.
Leverage the power of AI to foresee and preemptively address system incidents, ensuring smooth operations and zero downtime.
Empower your team with powerful root cause analysis to quickly identify, analyze, and resolve system incidents, enhancing efficiency and minimizing impact.
Gain a comprehensive overview of your system’s health with real-time monitoring data fusion and insight extraction, enabling informed decision-making and proactive management.
KubeInsight Proactive Autoscaling
Leverage predictive AI to proactively eliminate both service outages and resource waste.
InsightFinder supports SAML 2.0 by adding one additional SAML relay service to process all SSO requests from all kinds of IdPs like Microsoft Entra ID and Teleport.
1.Transfer the files for SAML Relay Service
cp downloads/saml.jar /
cp downloads/application.yml
2.Start the service with a configuration
java -jar saml.jar \ --spring.config.location=file:./application.yml
1.Generate certificates for Service Provider
openssl req -newkey rsa:2048 -nodes -keyout sp.key -x509 -days 365 -out sp.crt
2.Update the basic configuration part in application.yml.
Item | Description | Example Value |
---|---|---|
server.port | The port you want this service listens to. | 8080 |
insight-finder.serverUrl | The URL for InsightFinder engine. | https://app.insightfinder.com |
insight-finder.samlUrl | The full url for this SAML relay service. | https://saml.insightfinder.com:8080 |
insight-finder.sp-key | The path to the ServiceProvider key generated in step 1 | /app/certs/sp.key |
insight-finder.sp-cert | The path to the ServiceProvider certificate generated in step 1 | /app/certs/sp.crt |
3.Update the Identity Provider part saml.idp.your-idp in application.yml
Item | Description | Example Value |
---|---|---|
entity-id | The url to the SAML 2.0 metadata xml. | https://xxx.teleport.sh/enterprise/saml-idp/metadata |
firstname-key | The field name in the SAML principal that represents the user’s first name | http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname |
lastname-key | The field name in the SAML principal that represents the user’s last name | http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname |
email-key | The field name in the SAML principal that represents the user’s email address | http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress |
singlesignon-url | The URL of the Identity Provider's SAML 2.0 SSO service | https://xxx.teleport.sh/enterprise/saml-idp/sso |
idp-cert | The path of the certificate from the Identity Provider | /app/certs/SAML-IDP-X509.pem |
4.Register the SAML relay service in InsightFinder engine:
vi /opt/jetty/webapp/ROOT/WEB-INF/classes/saml.json
Add one entry to map all email address end with @examplecompany.com to this SAML relay service
"@examplecompany.com": "https:///saml2/authenticate/"
Attribute Name | Attribute Name Format | Attribute Value |
---|---|---|
firstname | unspecified | user.spec.traits.firstname |
lastname | unspecified | user.spec.traits.lastname |
unspecified | user.spec.traits.email |
Take InsightFinder for a no-obligation test drive. We’ll provide you with a detailed report on your outages to uncover what could have been prevented.