Skip to main content

Use SecureAuth as a SAML Identity Provider (IdP) for SSO

This quickstart walks you through configuring SecureAuth to act as a SAML Identity Provider, enabling authentication for external Service Providers (SPs) using the SAML 2.0 protocol.

SecureAuth as SAML IdP - Conceptual Diagram


1. Register a SAML Application

Create a new application that represents the SP (Service Provider):

  1. Go to Tenant Settings → Applications
  2. Click Add Application
  3. Choose:
    • Client Type: SAML
    • Application Type: SAML SP
  4. Provide:
    • Application Name (e.g., MySAMLApp)
    • ACS (Assertion Consumer Service) URL from the SP
    • Entity ID (also known as Audience URI)
tip

You can register multiple ACS URLs to support dev, test, and production environments.


2. Configure Identity Providers

Determine how users will authenticate before SecureAuth issues a SAML assertion:


3. Customize SAML Assertion

Define what SecureAuth includes in the SAML response:

  • Set the NameID format (e.g., email, username)
  • Map user attributes to SAML claims
  • Enable signature, encryption, or audience validation settings
note

To modify claim mappings and assertion behavior, go to the application's Claim Mapping and SAML Settings sections.


4. Retrieve IdP Metadata

Provide the Service Provider with SecureAuth’s metadata so it can validate SAML assertions.

  • Metadata URL: https://{tenant-domain}/{workspace}/saml-idp/metadata

Share this metadata XML file with the SP administrator.


5. Test the Login Flow

  1. From the SP, initiate a SAML authentication request
  2. SecureAuth prompts the user to log in
  3. SecureAuth sends a signed SAML assertion to the SP’s ACS URL

The SP validates the assertion and logs the user in.


6. Optional Enhancements