7. Type/paste the URL provided by Gem Madison into the SAML Consumer URL text field (e.g., https://<app.domain.com>/trust/Saml2/Auth/xxxxxxxxxxxx).
8. Type/paste the URL that matches the Gem Madison end into the WSFed/SAML Issuer text field; typically, this is the Fully Qualified Domain Name (FQDN) of the SecureAuth Appliance (e.g., https://<FQDN-SA-IdP>).
9. Type/paste the SP Entity ID provided by Gem Madison into the SAML Audience text field.
10. Type/paste the login URL of Gem Madison into the SP Start URL text field (e.g., https://<app.domain.com>).
11. Select SHA1 from the WS-Fed Signing Algorithm dropdown.
12. Select SHA1 from the SAML Signing Algorithm dropdown.
13. Select False from the Sign SAML Assertion dropdown.
14. Select True from the Sign SAML Message dropdown.
15. Leave the Signing Cert Serial Number as the default value unless there is a third-party certificate being used for SAML Assertion.
Note: If using a third-party certificate, click Select Certificate and choose the appropriate certificate.
16. Click the Save button.
e into the Name text field.
2. Select Basic from the Format dropdown.
Note: Ensure that these attributes are also mapped on the Data tab. Refer to this document: https://docs.secureauth.com/pages/viewpage.action?pageId=44833369 if unsure about LDAP attributes.
Ask the Gem Madison Support Resource to make the appropriate back-end change.