my-auth0-idp
, select Regular Web Application for the application type, and then select Create.john.doe@exampleco.com
, you should enter exampleco.com
for the email domain.Setting | Description |
---|---|
Connection Name | Enter any name, such as SAML-Auth0-IDP . |
Sign In URL | Enter the SAML Protocol URL value that you copied in above. |
Sign Out URL | Enter the same URL as for the Sign In URL above. |
X509 Signing Certificate | Click on the red UPLOAD CERTIFICATE… button and select the .pem file you downloaded above. |
urn:auth0:{yourTenant}:{yourConnectionName}
. Replace {yourConnectionName}
with the name of the connection you created for your IdP tenant.https://{yourDomain}/samlp/metadata?connection={yourConnectionName}
. Replace {yourConnectionName}
with the name of the connection you created for your IdP tenant.https://{yourDomain}/login/callback?connection={yourConnectionName}
. This is the URL on your SP tenant that receives the SAML assertion from the IdP tenant. In the next section, you will provide this URL to the IdP tenant so it knows where to send the SAML assertion.audience
key, and uncomment it, then remove the comma from the end of the line and replace the original value (urn:foo
) with the Entity ID value you copied previously (including the connection name you created in Step 4 when you configured your service provider tenant).
The new line should look like: “audience":"urn:auth0:{yourTenant}:{yourConnectionName}"
.<saml:Audience>
, and make sure it matches the Entity ID you entered on the previous screen.http://jwt.io
.
This is the list of allowed callback URLs to which users will be redirected after authentication. The URL(s) entered here must match the callback URL in the HTML code created in the next step. Normally you would enter a URL for your application, but to keep this example simple, the test user will be sent to the Auth0 JWT online tool, which provides some information about the JSON Web Token (JWT) returned at the end of the authentication sequence.{yourClientId}
and {yourDomain}
with the actual values of the application you registered above. (If you did not note those values, you can find them in the Application Settings on your SP tenant.)
audience
with the appropriate value for your application, but for the purposes of this test, a placeholder is sufficient. If you do specify the audience
parameter, ensure that it matches an identifier of an existing API you have configured in Auth0.