Enable or disable SAML Configure SAML in Smart ID Self-Service Smart ID Self-Service has an additional configuration options directly in the program, where SAML can be set to enabled or disabled. This means that multiple . - Multiple Self-Service instances with the same tenant, but different authentication methods, are allowed.
While "- If, for example, there are two Self-Service instances and both of them use the same tenant, one instance can use SAML whereas the other one doesn't.
To disable SAML for a Self-Service instance, add - Also, you can configure a button "Sign In with Single Sign-On" on the login page instead of automatically redirecting to the Identity Provider.
SAML and automatically redirecting are enabled by default, you can change this behavior in config.json. To disable SAML for a Self-Service instance, add "enabled": false to its config.json. This example shows how to enable SAML. By default it is enabled. - To turn of automatic redirecting to the Identity Provider, add
"enforced": false to its config.json. By default it is enforced. This means that this instance of Self-Service will show a button "Sign In with Single Sign-On" on the login page. If SAML is disabled for this instance of Self-Service this property has no effect. With this option you can use Pre-Login Processes while having SAML enabled. xmljs | title | Example: config.json |
---|
| , SAML enabled | /prime-ussp/assets/config/config.json
...
{
...
"saml": {
"enabled": true
"enforced": true
}
} |
Set up communication between Smart ID Self-Service and Identity ManagerTo set up the communication between Smart ID Self-Service and Identity Manager: - Open the file \prime_ussp\WEB-INF\classes\application.yaml.
- Adapt the URLs baseUrl so that point it points to where the Identity Manager main client is deployed. If you use HTTPS instead of HTTP you must ensure that the SSL server certificate of Identity Manager is of Identity Manager is trusted by the java environment that runs the Smart ID Self-Service (tomcat).
- Make sure that cookie forwarding is activated, that is, that there are empty values for the property property
sensitiveHeaders for for the SAML routes in the configuration file.This is the default configuration.
Code Block |
---|
title | Example: application.yaml |
---|
|
...
zuul:
...
routes:
...
saml:
pathprime:
…
baseUrl: http://localhost:8080/idm
…
zuul:
…
routes:
…
saml:
path: /saml/**
sensitiveHeaders:
url: http://localhost:8080/idm/saml/login
sensitiveHeaders:
url: ${prime.baseUrl}/saml/ |
|