SAML in Applications Manager can be configured in two ways. You can either do it manually by providing the necessary credentials or you can upload the metadata file directly, if available.
If you opt to configure SAML manually, you will need to provide with the following details in the Applications Manager UI: Entity ID, Assertion Consumer URL, SSO Logout URL. It will allow you to add Applications Manager as a supported application in your IdP.
You can also download the SP metadata file directly from Applications Manager and import it on the IdP side. This metadata file will have all the above-mentioned details in XML format.
Configuring IdP details is much the same as SP details configuration. You can either configure the IdP details manually or upload the metadata file fetched from the IdP side.
you can directly upload the metadata file in Applications Manager from your IdP, if you have one.
To enter the IdP details manually in Applications Manager, you will need the following details:
Enter the above details in the 'Configure IdP information manually' section under Settings → User Management → SAML Authentication.
While Configuring IdP Details, you can configure the "New Users Role". So if any user, who is not a user in APM, logins with SAML, a New user profile will be created based on this selected user role.
To see the steps to configure SAML between Applications Manager and that IdP, click the corresponding IdP name.
Yes. Once SAML authentication is enabled, there will be a checkbox to disable other authentications and you can disable other login methods, if necessary. Also, you will only be able to login locally via Super Admin.
No, currently only one IdP can be configured at a time.
At present, Transient, and Persistent are the Name ID formats supported for SAML authentication in Applications Manager .
In Applications Manager , you will not be able to use TFA when SAML authentication is enabled. This is because, the entire authentication flow is handled by the IdP when SAML authentication is enabled. TFA can be used only when signing in using Local or AD authentication.
If the IdP is not reachable and the other authentication methods are disabled, you can log in locally via Super Admin. If other authentication methods are not disabled, you can login to Applications Manager by using the Local or AD Authentication.
If the certificate is nearing expiry, Applications Manager will raise an alert after the user logs in. The Service Provider's certificate can be regenerated from the Applications Manager UI and uploaded to IdP and vice versa. After uploading, the lifetime of the certificates will be renewed.