/
SAManage
SAManage
The general overview of the SAManage.com side is here: https://blog.samanage.com/company/saml-single-sign-on-support-samanage/
To configure Shibboleth to work with SAManage.com:
- Configure your IdP to not encrypt assertions or nameIDs
- Configure your IdP to release the user's email address as the NameID with a name format of
urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
relying-party.xml
It is important to note here that you don't want encrypted assertions nor encrypted nameIDs
<RelyingParty id="SAManage.com" provider="urn:mace:incommon:uchicago.edu" defaultAuthenticationMethod="urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport" defaultSigningCredentialRef="IdPCredential"> <ProfileConfiguration xsi:type="saml:SAML2SSOProfile" encryptAssertions="never" encryptNameIds="never" /> </RelyingParty>
attribute-resolver.xml
<resolver:AttributeDefinition id="mailNameId" xsi:type="Simple" xmlns="urn:mace:shibboleth:2.0:resolver:ad"> <resolver:Dependency ref="email" /> <resolver:AttributeEncoder xsi:type="SAML2StringNameID" xmlns="urn:mace:shibboleth:2.0:attribute:encoder" nameFormat="urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress" /> </resolver:AttributeDefinition>
, multiple selections available,
Related content
Asana
Asana
More like this
Google Apps for Education
Google Apps for Education
More like this
Using SAML Proxying to another IdP
Using SAML Proxying to another IdP
More like this
Home
More like this
Home
More like this
SAMLAuthnConfiguration
SAMLAuthnConfiguration
More like this