Prerequisites

Alation Cloud Service Applies to Alation Cloud Service instances of Alation

Customer Managed Applies to customer-managed instances of Alation

Please contact your Account Team to obtain the ASM software. This is provided as a zip archive.

Alation Services Manager (ASM) requires a server to run on. This section describes the required infrastructure in terms of Linux OS, hardware, and networking.

For ACS customers, the ASM machine is typically an EC2 instance. For on-prem and self-managed customers the ASM machine should have a similar specification.

Infrastructure Requirements

ASM has the same infrastructure requirements as Alation Agent. To create the environment to host ASM please refer to the Agent System Requirements for Operating System (latest) and hardware details in the Alation Agent documentation.

Network Requirements

The following network inbound/outbound and DNS requirements are needed:

Outbound

  • API access to your Alation instance (HTTPS)

  • Access to your Alation Analytics database

    • For Cloud customers: Access to Alation Analytics on Snowflake

    • For On-prem customers: Access to Alation Analytics on Postgres

Inbound

  • Internal only http access on port 80 (no public access) is needed

DNS

  • A DNS entry is needed to allow internal routing to this system

Optional: SSL/TLS

We recommend customers place a load balancer in front of their ASM instance. Customers can configure an SSL cert on the load balancer and the load balancer will handle all HTTPS traffic. Work with your devops / cloud admin team to prepare to install a load balancer, and obtain the certificate and SSL/TLS configuration details.

Optional: SAML

ASM supports both local authentication (default) and SAML authentication. When SAML is enabled, ASM users will be redirected to the IDP to authenticate. The SAML IDP provider options supported by ASM are Entra ID and Okta.

Provision an Application for SAML Authentication

To enable ASM’s SAML support, first configure an application through your Identity Provider (IDP).

You will also need to download the XML Metadata file from your IDP and copy the XML file to the instance where you will be installing ASM during the Installation steps.

Next, collect the following details needed to configure SAML:

SAML_PROVIDER='entra_id'           # 'entra_id' or 'okta'
ENTITY_ID='https://alation.com/'   # example 'https://alation.com' - needs to match the entity id set up on the IDP (Entra ID, Okta)
WANT_ASSERTIONS_SIGNED=True        # True or False (default: True)
WANT_RESPONSE_SIGNED=False         # True or False (default: False)