Splunk AppDynamics

How do I map Group/users in Accounts Management Portal

Randy_Manipon
New Member

Just want to ask if the approach in mapping groups/users in appdynamics controller is the same in Account Portal?

I already configured the SAML federation and in azure.Then,  in Azure, I added a group and map in account portal for the SSO. However, users are still requires to to enter a password upon login. Is there something I missed? 

Labels (3)
0 Karma
1 Solution

Bill_Howard
Explorer

Hi @Randy.Manipon 

At this time, there is no grouping support for the Accounts SAML federation feature.  The current functionality is for identity authentication only.  Any user that is set to authenticate through the IDP that you have configured through the SAML federation function will be directed to your IDP for authentication.   This requires one of 2 things: 1) user is registered already in Accounts user management and set to be authenticated by your IDP or 2) user is "just in time" (JIT) provisioned into Accounts user management through the IDP initiated flow.    Once the user record is established in the Accounts user management listing, when they come to the Accounts pages or services of appd.com to login, they should get directed to your Azure IDP to authenticate.  

For reference, the documentation is here: https://docs.appdynamics.com/21.12/en/appdynamics-essentials/account-management/account-management-p...

Over time, we do aim to provide improved JIT provisioning as well as attribute mapping support to enable access control from SAML attributes.  Look for some of those improvements later this year.

Does this help?  

View solution in original post

Bill_Howard
Explorer

Hi @Randy.Manipon 

At this time, there is no grouping support for the Accounts SAML federation feature.  The current functionality is for identity authentication only.  Any user that is set to authenticate through the IDP that you have configured through the SAML federation function will be directed to your IDP for authentication.   This requires one of 2 things: 1) user is registered already in Accounts user management and set to be authenticated by your IDP or 2) user is "just in time" (JIT) provisioned into Accounts user management through the IDP initiated flow.    Once the user record is established in the Accounts user management listing, when they come to the Accounts pages or services of appd.com to login, they should get directed to your Azure IDP to authenticate.  

For reference, the documentation is here: https://docs.appdynamics.com/21.12/en/appdynamics-essentials/account-management/account-management-p...

Over time, we do aim to provide improved JIT provisioning as well as attribute mapping support to enable access control from SAML attributes.  Look for some of those improvements later this year.

Does this help?  

Get Updates on the Splunk Community!

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...