Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Code Block
languagepowershell
# Specifies if SAML authentication is enabled.
login.saml.enabled=true

# Specifies if during SAML login users are automatically created when they do not exist in TermWeb.
# If this feature is disabled, then non-existing users can be logged in as guests.
login.saml.autocreate.users=true

# Specifies if failed SAML login will log user in as Guest instead.
login.saml.login.as.guest.when.usermissing=true

# The entity Id of TermWeb Service Provider (SP)
login.saml.sp.entityid=example.termweb.eu

# Assertion consumer service (default value is: urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST)
login.saml.sp.acs.binding=urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST

# Service provider nameidformat (default value is: urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified)
login.saml.sp.nameidformat=urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified

# The entity Id of the Identity Provider (IdP)
login.saml.idp.entityid=https://app.example.com/saml/metadata/12345678-abcd-1234-abcd-0123456789ab

# The URL of the IdP for Single SignOn
login.saml.idp.sso.url=https://termweb-dev.example.com/trust/saml2/http-post/sso/12345678-abcd-1234-abcd-0123456789ab

(default value is: urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect)
login.saml.idp.sso.binding=urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect

# The certificate of the IdP
login.saml.idp.x509.certificate=CERTIFICATEPUBLICKEY

# Enable XML validation (default is: true)
login.saml.security.xml.validation.enabled=true|false

termweb.properties example:

  • login.saml.enabled=true

  • login.saml.autocreate.users=true

  • login.saml.sp.entityid=customer.termweb

  • login.saml.idp.entityid=customer.idp

  • login.saml.login.as.guest.when.usermissing=true

  • login.saml.idp.sso.url=https://customer.url.com/idp/startSSO.ping?PartnerSpId=customer.termweb

  • login.saml.idp.x509.certificate=cA0GCSqGSIb3DQEBBQUAMGYxCzAJBgNVBAYTAlVTMQswCQYDVQQIEwJDTzEPMA0GA1UEBxMGRGVudmVyMQwwCgYDVQQKEwNEZXYxDTALBgNVBAsTBFBpbmcxHDAaBgNVBAMTE0NvbmZpZyBTaWduaW5nxHDAaBgNVBAMTE0NvbmZpZyBTaWduaW5nIENlcnQwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIMtrWwGzm7IenVL1WJ4LHPJI0OYt8qH7nZ6FFUDW0fbuIMMLo/AgMBAAEwDQYJKoZIhsTBFBpbmTAlVTMQswCQYDVQQIEwJDTzEPMA0GA1UEBxMGRGVudmVyMQwwCgYDVQQKEwNEZXYxDTALBgNVBAri1QB59uqG0CwU2/AJV3KU2KM\
    cA0GCSqGSIb3DQEBBQUAMGY\
    xCzAJBgNVBAYTAlVTMQswCQY\
    DVQQIEwJDTzEPMA0GA1UEBxM=

SAML SSO Login step by step

...