Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 9 Next »

Security Assertion Markup Language (SAML) is a login standard that helps users access applications based on sessions in another context. It’s a single sign-on (SSO) login method offering more secure authentication (with a better user experience) than usernames and passwords.

ConfigurationSAML-20231205-101539.png

  • Login Page

    • A url provided by the SAML idenitty provider. When the login process is started, the user is forwarded to this url.

  • IDP Entity ID

    • An identifier provided by the SAML identity provider. Usually this is a URL that belongs to the SAML idenity provider.

  • Certificate

    • An X509 certifcate in PEM format, provided by the SAML identity provider.

  • Attribute Display Name (optional)

    • Name of the user attribute that holds the display name.

  • Attribute Email (optional)

    • Name of the user attribute that holds the email address.

  • Attribute Role (optional)

    • Name of the user attribute that holds the user's role. This allows using the SAML idenity provider to assign user roles.

  • Attribute Role Admin Value (optional)

    • If attributeRole is configured and that user attribute holds the value configured in attributeRoleAdminValue, the user will be logged in as global admin.

  • SP Entity ID

    • Copy this value to the SAML identity provider. It is used to tie SAML login responses to this specific application.

  • Login Response Url

    • Copy this URL to the SAML identity provider. This is where the SAML identity provider should redirect to on successful login.

  • No labels