Skip to content

Commit 5a55332

Browse files
committed
Restoring the table
1 parent 2a7d6f3 commit 5a55332

File tree

1 file changed

+38
-6
lines changed
  • content/en/docs/appstore/use-content/platform-supported-content/modules/SAML

1 file changed

+38
-6
lines changed

content/en/docs/appstore/use-content/platform-supported-content/modules/SAML/_index.md

Lines changed: 38 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -298,12 +298,44 @@ The following entities are used to create IdP configurations:
298298
* `Dep_SAMLAuthnContext`: List of SAMLAuthnContext
299299
* `Dep_IdpAttributeEntityAttributeMapping`: List of Attribute Mapping
300300
301-
The below table shows you the constants used to configure the SP Metadata.
302-
303-
| IDPConfiguration(Non-Persistable entity) | Description |
304-
| --- | --- |
305-
| **Alias** (mandatory) | This represents the IdPconfiguration Alias |
306-
| **IdPMetadataURL** (mandatory) | This represents the URL of the IdPMetadataURL |
301+
The below table shows you the different attributes and their values for quick reference. You can see the details of these attributes of the above entities in the [Reference Guide for SAML IdP Configuration](/appstore/modules/saml/idp-attributes/) document.
302+
303+
| IDPConfiguration(Non-Persistable entity) | Description | Default Value |
304+
| --- | --- | --- |
305+
| **Alias** (mandatory) | This represents IdPconfiguration Alias | |
306+
| **ResponseProtocolBinding** | Response protocol binding contains a caption value of SAML20.Enum_ProtocolBinding | POST_BINDING |
307+
| **EnableAssertionConsumerServiceIndex** | EnableAssertionConsumerService Concept contains caption value of SAML20.Enum_AssertionConsumerServiceIndex | NO |
308+
| **AssertionConsumerServiceIndex** | This should hold the same value for the SAML configuration and the IdPs. | 0 |
309+
| **EnableInitialLoginAttributeConsumingService** | This will be returned when the end-user initially signs in | FALSE |
310+
| **InitialLoginServiceName** | It represents the Initial login Attribute Consuming Service name | Service1 |
311+
| **InitialLoginAttributeConsumingServiceIndex** | It represents the Initial login Attribute Consuming Service Index | 1 |
312+
| **InitialLoginDep_SPAttribute_Dep_IdPConfiguration** | It will display the details of Value, Name, IsRequired details | |
313+
| **EnableInSessionAttributeConsumingService** | To enable this feature, configure at least one request attribute for the in-session attribute consuming service. | FALSE |
314+
| **InSessionServiceName** | It represents the In-Session Attribute Consuming Service name | Service2 |
315+
| **InSessionAttributeConsumingServiceIndex** | It represents the In-Session Attribute Consuming Service Index | 2 |
316+
| **InSessionDep_SPAttribute_Dep_IdPConfiguration**| It will display the details of Value, Name, IsRequired details | |
317+
| **IdPMetadataURL** (mandatory) | This represents the URL of the IdPMetadataURL | |
318+
| **PreferredEntityDescriptor** | It represents the entityID of the EntityDescriptor | |
319+
| **AllowIdpInitiatedAuthentication** | Authentication should start at this application, which generates an ID. The authenticated response should match this generated Id. If no request can be found that matches the response Id the information is rejected. If your IdP can initiate a new transaction (with a new or no Id) and you want to allow this you can check this box. | FALSE |
320+
| **EnableForceAuthentication** | will force the SAML IdP to (re)authenticate end-users, even if they are already signed in at the SAML IdP. | FALSE |
321+
| **EnableMobileAuthToken** | If enabled, an auth token cookie will be set on login that can be used by Mendix hybrid mobile apps to log in after the app is closed. | FALSE |
322+
| DelegatedAuthenticationURL | This will allow you to use a SAML token and delegate the authentication through SAML. | |
323+
| **CustomPrepareInSessionAuthenticationMicroflow** | This represents the Custom Prepare In-Session Authentication microflow. It sets up specific data in the current user session so that it can be recovered after the SAML in-session authentication flow returns to the app. | |
324+
| **CustomEvaluateInSessionAuthenticationMicroflow** | It implements the logic that handles the authentication details of the in-session authentication. | |
325+
| **NameIDFormat** | This attribute represents the Description of SAML20.NameIDFormat. Disable NameID policy is true when this attribute (NameIDFormat) is invalid. | |
326+
| **AuthenticationContext** | It represents Authentication context comparison contains the caption value of SAML20.TypeOfAuthnContext | Exact (Default) |
327+
| **UserEntity** | The Mendix entity in which you will store and look up the user account. | Administration.Account |
328+
| **UserPrincipalAttribute** | Determines the attribute on which you want to do the lookup in Entity attributes. | Name |
329+
| **UserIdPPrincipalAttribute** | We need to provide the attribute that contains the user name that uniquely identifies the user. It should be Assertion Name | UseNameID |
330+
| **CreateUsers** | The module will always search for the user, based on the Identifying Assertion. You can allow the module to create users with a predefined user role. If you allow the module to create users, it will automatically create a new user account if the user cannot be found. If the module is not allowed to create users, it will present a message to the user stating that the login action was successful but no user has been configured. | true |
331+
| **UserRoleName** | This role will be assigned to newly created users. | User |
332+
| **UserType** | Assign user type to the created users | Internal |
333+
| **CustomUserProvisioning** | This is an optional configuration to run a microflow to persist user information in your app model using some of your own specific logic. First, you need to develop a custom microflow in your app and select it for the CustomUserProvisioning. | |
334+
| **CustomAfterSigninLogic** | Checking the box will execute the `CustomAfterSigninLogic microflow`. You can replace the default with your custom microflow below. This microflow runs after a new session is created, allowing you to copy or review data from the original (anonymous) session to the new session or user. This functionality is similar to the after-sign-in microflow in Mendix project security. Only custom microflows starting with 'Custom' will appear in the list. | |
335+
| **UseEncryption** | Enable better security for app | TRUE |
336+
| **EncryptionMethod** | This represents the Encryption Algorithm | SHA256 - RSA |
337+
| **EncryptionKeyLength** | This constant represents the Encryption length | 2048 bits |
338+
| Active | After completion of IdP config it will make the Toggle Active | true |
307339
308340
Deploy the application and log in with the SSO. For more information, see the [Deploy the Application and Login with SSO](#deploy-application) section above.
309341

0 commit comments

Comments
 (0)