SAML SP
Last updated
Last updated
This authenticator act as a SAML SP.
Typically used in SAML brokering scenarios when one or more methods of identification reside on remote IDP.
Authenticator type: SAMLSPBroker
Common Authenticator configuration can be found here.
Name | Description | Default value | Mandatory |
---|---|---|---|
The incoming request must be signed. Signed assertions is not validated.
Encrypted assertions are not supported.
On a successful authentication event is logged containing the following:
WEB_100014("Authenticated using SP-broker method")
IDENTIFIER (user traceid)
SOURCE_SERVICE_NAME (entity id from the SAML response)
SOURCE_USER_NAME (name id from the issued assertion)
SOURCE_ADDRESS (user IP address)
CUSTOMER_IDENTIFIER (if configured)
When consuming and validating the response only one assertion is allowed. The response MUST be signed. Signature in the assertion is not validated. Encrypted assertions are not supported.
Currently, only POST binding is supported for outbound and incoming request/response.
After successful validation, data stored in the global state are:
nameID - containing the name-id reported in the assertion.
remoteIssuer - value of the IDP entityID issuing the assertion.
All additional attributes from the assertion. Multivalued attributes are merged into a comma-separated string.
issue_as_sp_entity
When sending authn request, what is the entity id used.
N/A
target_idp_entity
The remote IDP entity id to trust.
N/A
custom_identifier
Custom identifier to be set inte the event logging entry
N/A
force_auth_request
Should the auth request force re-authentication
false
sign_algorithm
Which signature algorithm to use if signing authn-requests. Ensure it is working with the private key used. This will only affect requests sent to idp's requiring signing requests.
sign_digest_method
Which digest method to use if signing authn-requests. Ensure it is working selected signature algorithm. This will only affect requests sent to idp's requiring signing requests.