Use SecureAuth as a SAML Identity Provider (IdP) for SSO
This quickstart walks you through configuring SecureAuth to act as a SAML Identity Provider, enabling authentication for external Service Providers (SPs) using the SAML 2.0 protocol.
What is SAML?
Security Assertion Markup Language (SAML) 2.0 is an XML-based standard for browser-based single sign-on. The user authenticates once with an Identity Provider (IdP), which then issues a signed SAML assertion to each downstream Service Provider (SP) (a business application, SaaS tool, or internal portal), granting access without a second login.
SAML remains the default integration point for enterprise and workforce SSO:
- Enterprise reach. Nearly every established B2B SaaS product ships a SAML connector. If your customers run an IdP already (Okta, Entra ID, Ping, SecureAuth), SAML is usually the first protocol they ask for.
- Works for first-party apps too. Many organizations federate their own internal apps through a single SAML IdP, so one login grants access to the HR tool, the ticketing system, and the data warehouse. This is how most workforce portals work today.
- Complementary to OIDC. Modern stacks often run both: OIDC for new consumer and mobile apps, SAML for legacy and enterprise SSO. SecureAuth issues both from the same tenant.
SecureAuth runs as a SAML 2.0 Identity Provider, signing assertions with tenant keys and publishing standard IdP metadata for any SP to consume.
Browser SSO flow (SP-initiated)
1. Register a SAML Application
Create a new application that represents the SP (Service Provider):
- Go to Tenant Settings → Applications
- Click Add Application
- Choose:
- Client Type:
SAML - Application Type:
SAML SP
- Client Type:
- Provide:
- Application Name (e.g.,
MySAMLApp) - ACS (Assertion Consumer Service) URL from the SP
- Entity ID (also known as Audience URI)
- Application Name (e.g.,
You can register multiple ACS URLs to support dev, test, and production environments.
2. Configure Identity Providers
Determine how users will authenticate before SecureAuth issues a SAML assertion:
3. Customize SAML Assertion
Define what SecureAuth includes in the SAML response:
- Set the NameID format (e.g., email, username)
- Map user attributes to SAML claims
- Enable signature, encryption, or audience validation settings
To modify claim mappings and assertion behavior, go to the application's Claim Mapping and SAML Settings sections.
4. Retrieve IdP Metadata
Provide the Service Provider with SecureAuth’s metadata so it can validate SAML assertions.
- Metadata URL:
https://{tenant-domain}/{workspace}/saml-idp/metadata
Share this metadata XML file with the SP administrator.
5. Test the Login Flow
- From the SP, initiate a SAML authentication request
- SecureAuth prompts the user to log in
- SecureAuth sends a signed SAML assertion to the SP’s ACS URL
The SP validates the assertion and logs the user in.