Skip to main content
Skip table of contents

Zabbix SAML Integration

This document explains how to implement Monosign with Zabbix. It covers Single Sign-On. Before you continue, it is better to start with Zabbix’s Single Sign-On implementation page.

Monofor has no responsibility to do Zabbix configurations. If you need support please contact Zabbix Support Services.

📑 Instructions

This documentation contains 4 main steps for integration.

  1. Creating an Application on Monosign

  2. Configuration Single Sign-On for Zabbix

  3. Assign a user to the Zabbix application

  4. Sign In Test

1- Creating an Application on Monosign

Create application on Monosign and configure your access policy. Once you create, click “Keys” and add a new Access Key for SAML Key for access.

This information will be necessary during the configuration of the application.

Property

Value

Options

Key Type

SAML

Rest API, OAuth 2.0, JWT, OIDC/OpenID, SAML, RADIUS, Access Gateway, LDAP, AuthN/Z Server

Expiration

Lifetime

Lifetime or Specific Date/Time - By Default Lifetime is Enabled.

Configuration details for the Zabbix application are provided as follows:

Change Assertion Consumer URL, Audience, Entity Id, Name Id, Logout Url, Attribute Mapping and Group Mapping.

Property

Value

Assertion Consumer URL

https://<Zabbix-FQDN-OR-IP>/zabbix/index_sso.php?acs

Audience

zabbix

Entity Id

zabbix

Name Id

UserName

Logout Url

https://<Zabbix-FQDN-OR-IP>/zabbix/index_sso.php?sls

Attribute Mapping

Attribute : UserName

Value : {{UserName}}

Attribute : Email

Value : {{Email}}

Attribute : FirstName

Value : {{Profile.FirstName}}

Attribute : LastName

Value : {{Profile.LastName}}

Attribute : Mobile

Value : {{Profile.MobilePhone}}

Group Mapping

Enable

image-20250318-025546.png
image-20250318-025915.png
image-20250318-030008.png
image-20250312-110851.png

To ensure that the application has access to user groups, follow these steps:

  1. If the application hasn't been configured yet, click the “Edit” option for the application.

  2. In the application settings, navigate to the “Source, Provider, and Profile” tab.

  3. Configure the “User Access Type“ and “User Group Access Type” as “Only Assigned Users.”

Configuring this setting will allow the application to access by user groups when users sign in.

Property

Description

Options

User Access Type

Defines which Users will access to this application.

Only Assigned Users
All Users

User Group Access Type

Defines application’s user group access

Only Assigned Users
Assigned Users and Defined Sources
All Users

Profile Access Type

Defines Application’s user’s profile access

Restricted - Only restricted user profile attributes
All - All user profile attributes

2- Configuration Single Sign-On for Zabbix

As it highlighted at the beginning of document, please check out the Zabbix’s SSO configuration page first.

Please add your Zabbix settings to the application. The following information is needed for your configuration.

Below information needed before configure the Zabbix.

Property

Value

Enable SAML authentication

Enable

Enable JIT provisioning

Enable

IdP entity ID

https://account.monofor.com/saml/468dcbfb-f55c-4235-a8d8-1d362b98865c

SSO service URL

https://account.monofor.com/saml/468dcbfb-f55c-4235-a8d8-1d362b98865c/login

SLO service URL

https://account.monofor.com/saml/468dcbfb-f55c-4235-a8d8-1d362b98865c/logout

Username attribute

UserName

SP entity ID

zabbix

Configure JIT provisioning

Enable

Group name attribute

Groups

User name attribute

FirstName

User last name attribute

LastName

User group mapping

image-20250318-031253.png

Media type mapping

image-20250318-031339.png

Open Zabbix Users → AuthenticationAuthentication

If JIT provisioning is enabled, a user group for deprovisioned users must be specified in the Authentication tab.

image-20250318-031849.png

Open Zabbix Users → AuthenticationSAML settings

image-20250318-031742.png

Setup Zabbix server to trust Monosign IdP certificate

Download Monosign IdP certificate.

image-20250318-025649.png

Rename this certificate as monosign.crt and put under /usr/share/zabbix/ui/conf/certs on the Zabbix Server.

Change Zabbix configuration to trust this certificate.

Open this file /etc/zabbix/web/zabbix.conf.php

BASH
// Used for SAML authentication.
// Uncomment to override the default paths to SP private key, SP and IdP X.509 certificates, and to set extra settings.
//$SSO['SP_KEY']                        = 'conf/certs/sp.key';
//$SSO['SP_CERT']                       = 'conf/certs/sp.crt';
$SSO['IDP_CERT']                = 'conf/certs/monosign.crt';
//$SSO['SETTINGS']              = [];

Now, go back to Monosign and give access to your users and try login.

3- Assign a user to the Zabbix application

Please follow below instructions on how to assign a user to the Zabbix application. In this example john.smith will assign to the application access.

4- Sign In Test

Now try login. Navigate to the Zabbix application login page. Click Log in with Monosign.

image-20250318-032500.png

If everything is well configured, the page will be redirected to Monosign’s login page. It can be log in passwordless with QR code or type username and password.

image-20250318-032652.png

When the user logged in, the page will be redirected to the Zabbix page.

image-20250318-033145.png
JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.