This repository has been archived on 2024-05-31. You can view files and clone it, but cannot push or open issues or pull requests.
authentik/website/integrations/services/zabbix/index.md

64 lines
2.3 KiB
Markdown
Raw Normal View History

2021-06-02 21:16:52 +00:00
---
title: Zabbix
---
<span class="badge badge--secondary">Support level: Community</span>
2021-06-02 21:16:52 +00:00
## What is Zabbix
> Zabbix is the ultimate enterprise-level software designed for real-time monitoring of millions of metrics collected from tens of thousands of servers, virtual machines and network devices.
>
> Zabbix is Open Source and comes at no cost.
>
> -- https://www.zabbix.com/features
2021-06-02 21:16:52 +00:00
## Preparation
The following placeholders will be used:
- `zabbix.company` is the FQDN of the Zabbix install.
- `authentik.company` is the FQDN of the authentik install.
2021-06-02 21:16:52 +00:00
Create an application in authentik and note the slug, as this will be used later. Create a SAML provider with the following parameters:
- ACS URL: `https://zabbix.company/zabbix/index_sso.php?acs`
- Issuer: `zabbix`
- Service Provider Binding: Post
2021-06-02 21:16:52 +00:00
You can of course use a custom signing certificate, and adjust durations.
## Zabbix Configuration
Navigate to `https://zabbix.company/zabbix/zabbix.php?action=authentication.edit` and select SAML settings to configure SAML.
2021-06-02 21:16:52 +00:00
Check the box to enable SAML authentication.
Set the Field `IdP entity ID` to `zabbix`.
Set the Field `SSO service URL` to `https://authentik.company/application/saml/zabbix/sso/binding/redirect/`.
2021-06-02 21:16:52 +00:00
Set the Field `Username attribute` to `http://schemas.goauthentik.io/2021/02/saml/username`
Set the Field `SP entity ID` to `https://authentik.company/application/saml/zabbix/sso/binding/redirect/`
Set the Field `SP name ID format` to `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`
2021-06-02 21:16:52 +00:00
Check the box for `Case sensitive login`.
For the `SAML Service Provider Certificate` and `SAML Service Provider Private Key`, you can either use custom certificates, or use the self-signed pair generated by authentik.
Copy the cert and key to `/usr/share/zabbix/conf/certs/`, the system looks for `sp.key` and `sp.crt` by default.
The certificate path can be configured in the Zabbix frontend configuration file (zabbix.conf.php)
```
$SSO['SP_KEY'] = '<path to the SP private key file>';
$SSO['SP_CERT'] = '<path to the SP cert file>';
```
For additional security you can enable the Verification Certificate by checking the `Sign -> AuthN requests` in the Zabbix configuration and adding the IDP Certificate to the cert path above or defining it in your Zabbix frontend configuration file.
```
$SSO['IDP_CERT'] = '<path to the IDP cert file>';
```