How do I connect Amazon Managed Grafana Azure App from Gallery with Amazon Managed Grafana

marafado88 21 Reputation points
2025-03-06T19:08:21.9933333+00:00

Hello everyone,

So I am having some issues while connecting Amazon Managed Grafana Azure App from Gallery with Amazon Managed Grafana, mostly when trying to parse groups for permissions. Currently users are able to login if added to target groups added on Amazon Managed Grafana Azure App, but with Grafana viewer mode something expected when no permissions applied.

This is what I have currently on Azure App side and what I have on Amazon Managed Grafana (under role values, I have Azure Security Group IDs):

User's image

User's image

ave any of you setup this integration or any thing similar with custom claims?

Microsoft Security | Microsoft Entra | Microsoft Entra ID
0 comments No comments
{count} votes

Accepted answer
  1. Kancharla Saiteja 5,485 Reputation points Microsoft External Staff Moderator
    2025-03-10T06:32:50.0466667+00:00

    Hi marafado88,

    Thank you for posting your query on Microsoft Q&A.

    Based on your query, I understand that you would like to know the permissions required for viewer mode on Grafana.

    The configuration that you made in Azure and Grafana is about the authentication using SSO. This configuration involves the user authentication which has been properly configured on both ends. But when it comes to viewer mode or what are the permissions that we need to have from Grafana, you may need to check with Grafana team itself.

    If you would like to set some roles for the users in Azure, you can do that while adding the users and groups to the application. Here is the Microsoft document: Assign the Microsoft Entra test user. But these roles work within Azure itself.

    If you would like to work with roles for the users in Grafana, you can please take a look with Grafana document: Assertion mapping.

    • For Assertion attribute role, specify the name of the attribute within the SAML assertion to use as the user roles.
    • For Assertion attribute name, specify the name of the attribute within the SAML assertion to use for the user full "friendly" names for SAML users.
    • For Assertion attribute login, specify the name of the attribute within the SAML assertion to use for the user sign-in names for SAML users.
    • For Assertion attribute email, specify the name of the attribute within the SAML assertion to use for the user email names for SAML users.
    • For Assertion attribute organization, specify the name of the attribute within the SAML assertion to use for the "friendly" name for user organizations.
    • For Assertion attribute groups, specify the name of the attribute within the SAML assertion to use for the "friendly" name for user groups.
    • For Allowed organizations, you can limit user access to only the users who are members of certain organizations in the IdP.
    • For Editor role values, specify the user roles from your IdP who all should be granted the Editor role in the Amazon Managed Grafana workspace.

    This might help you in providing proper roles to the users to access Grafana and work with the dashboards.

    Additional information:

    Microsoft Entra single sign-on (SSO) integration with Amazon Managed Grafana

    Configure Amazon Managed Grafana to use Azure AD

    NOTE: We don't hold any responsible on Amazon Grafana documents from Amazon. We have shared the information for your knowledge.

    I hope this information is helpful. Please feel free to reach out if you have any further questions.

    If the answer is helpful, please click "Accept Answer" and kindly "upvote it". If you have extra questions about this answer, please click "Comment".

    1 person found this answer helpful.

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.