Field | Description |
---|---|
Sign In URL | The URL where SAML authentication requests are sent. This is also called the single sign-on (SSO) endpoint. |
Sign Out URL | The URL where SAML logout requests are sent. This is also called the single logout (SLO) endpoint. |
X509 Signing Certificate | The public-key certificate required by the SP to validate the signature of the authentication assertions that have been digitally signed by the IdP. Auth0 accepts the .pem and .cer formats. |
Setting | Description |
---|---|
Connection Name | Enter a connection name such as SAML-SP . |
Sign In URL | Enter the Sign In URL that you obtained from the IdP. |
X509 Signing Certificate | Upload the X509 Signing Certificate file (in .pem or .cer format) that you obtained from the IdP. |
Enable Sign Out | Enable the Sign Out URL field. |
Sign Out URL | Enter the Sign Out URL obtained from the IdP. |
User ID Attribute | Enter the attribute in the SAML token that will be mapped to the user_id property in Auth0. If not set, then the user_id will be retrieved from the following (in listed order): |
Debug Mode | Enable Debug Mode for more verbose logging. |
Sign Request | Enable signed SAML authentication requests. |
Sign Request Algorithm | From the dropdown menu, select the hash algorithm to use. |
Sign Request Algorithm Digest | From the dropdown menu, select the algorithm to use to check the validity of the assertion. |
Protocol Binding | From the dropdown menu, select one of the following options:
|
Sync user profile attributes at each login | Enable syncing user profile attributes during each login. |
destinationUrl
and recipientUrl
fields accordingly.
options
object from the returned response.options
object:Field | Type | Value |
---|---|---|
destinationUrl | String | URL of the proxy gateway. |
recipientUrl | String | URL of the proxy gateway. |
options
object in the request body.AuthnRequest
object. You can customize the template used for this object:
AuthnRequest
template using the @@VariableName@@
syntax. The following variables are available:
Name | Description |
---|---|
AssertionConsumerServiceURL | The URL where the IdP sends the response after the user signs in. Include the ProtocolBinding attribute in the request template if you use this. |
Connection.<options-key> | Use dot notation on the Connection key to access any of the connection’s options values as returned from the Auth0 Management API’s Get a Connection endpoint. For example, if the connection has options.some_property: “value” , then you can use @@Connection.some_property@@ in the template. |
Destination | The URL where Auth0 sends the request. This should be the Sign In URL configured for the connection. |
ID | The transaction ID. |
IssueInstant | The transaction date timestamp. |
Issuer | The entity ID of the SP in urn format. For example, urn:auth0:<YOUR_AUTH0_TENANT_NAME>:<YOUR_AUTH0_CONNECTION_NAME> . |
LoginHint | The username or email of the user logging in. If you are using Identifier First Authentication, Auth0 can send this value to the IdP to pre-populate it in the IdP’s login form. |
ProtocolBinding | The protocol binding type. |
ProviderName | The name of the application that initiated the request. This always returns the Auth0 tenant name. |
AssertServiceURLAndDestination | Deprecated. For new configurations, use AssertionConsumerServiceURL and Destination instead. |