You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| **Alias** (mandatory) | This represents the IdPconfiguration Alias |
306
-
| **IdPMetadataURL** (mandatory) | This represents the URL of the IdPMetadataURL |
301
+
The below table shows you the different attributes and their values for quick reference. You can see the details of these attributes of the above entities in the [Reference Guide for SAML IdP Configuration](/appstore/modules/saml/idp-attributes/) document.
302
+
303
+
| IDPConfiguration(Non-Persistable entity) | Description | Default Value |
304
+
| --- | --- | --- |
305
+
| **Alias** (mandatory) | This represents IdPconfiguration Alias | |
306
+
| **ResponseProtocolBinding** | Response protocol binding contains a caption value of SAML20.Enum_ProtocolBinding | POST_BINDING |
307
+
| **EnableAssertionConsumerServiceIndex** | EnableAssertionConsumerService Concept contains caption value of SAML20.Enum_AssertionConsumerServiceIndex | NO |
308
+
| **AssertionConsumerServiceIndex** | This should hold the same value for the SAML configuration and the IdPs. | 0 |
309
+
| **EnableInitialLoginAttributeConsumingService** | This will be returned when the end-user initially signs in | FALSE |
310
+
| **InitialLoginServiceName** | It represents the Initial login Attribute Consuming Service name | Service1 |
311
+
| **InitialLoginAttributeConsumingServiceIndex** | It represents the Initial login Attribute Consuming Service Index | 1 |
312
+
| **InitialLoginDep_SPAttribute_Dep_IdPConfiguration** | It will display the details of Value, Name, IsRequired details | |
313
+
| **EnableInSessionAttributeConsumingService** | To enable this feature, configure at least one request attribute for the in-session attribute consuming service. | FALSE |
314
+
| **InSessionServiceName** | It represents the In-Session Attribute Consuming Service name | Service2 |
315
+
| **InSessionAttributeConsumingServiceIndex** | It represents the In-Session Attribute Consuming Service Index | 2 |
316
+
| **InSessionDep_SPAttribute_Dep_IdPConfiguration**| It will display the details of Value, Name, IsRequired details | |
317
+
| **IdPMetadataURL** (mandatory) | This represents the URL of the IdPMetadataURL | |
318
+
| **PreferredEntityDescriptor** | It represents the entityID of the EntityDescriptor | |
319
+
| **AllowIdpInitiatedAuthentication** | Authentication should start at this application, which generates an ID. The authenticated response should match this generated Id. If no request can be found that matches the response Id the information is rejected. If your IdP can initiate a new transaction (with a new or no Id) and you want to allow this you can check this box. | FALSE |
320
+
| **EnableForceAuthentication** | will force the SAML IdP to (re)authenticate end-users, even if they are already signed in at the SAML IdP. | FALSE |
321
+
| **EnableMobileAuthToken** | If enabled, an auth token cookie will be set on login that can be used by Mendix hybrid mobile apps to log in after the app is closed. | FALSE |
322
+
| DelegatedAuthenticationURL | This will allow you to use a SAML token and delegate the authentication through SAML. | |
323
+
| **CustomPrepareInSessionAuthenticationMicroflow** | This represents the Custom Prepare In-Session Authentication microflow. It sets up specific data in the current user session so that it can be recovered after the SAML in-session authentication flow returns to the app. | |
324
+
| **CustomEvaluateInSessionAuthenticationMicroflow** | It implements the logic that handles the authentication details of the in-session authentication. | |
325
+
| **NameIDFormat** | This attribute represents the Description of SAML20.NameIDFormat. Disable NameID policy is true when this attribute (NameIDFormat) is invalid. | |
326
+
| **AuthenticationContext** | It represents Authentication context comparison contains the caption value of SAML20.TypeOfAuthnContext | Exact (Default) |
327
+
| **UserEntity** | The Mendix entity in which you will store and look up the user account. | Administration.Account |
328
+
| **UserPrincipalAttribute** | Determines the attribute on which you want to do the lookup in Entity attributes. | Name |
329
+
| **UserIdPPrincipalAttribute** | We need to provide the attribute that contains the user name that uniquely identifies the user. It should be Assertion Name | UseNameID |
330
+
| **CreateUsers** | The module will always search for the user, based on the Identifying Assertion. You can allow the module to create users with a predefined user role. If you allow the module to create users, it will automatically create a new user account if the user cannot be found. If the module is not allowed to create users, it will present a message to the user stating that the login action was successful but no user has been configured. | true |
331
+
| **UserRoleName** | This role will be assigned to newly created users. | User |
332
+
| **UserType** | Assign user type to the created users | Internal |
333
+
| **CustomUserProvisioning** | This is an optional configuration to run a microflow to persist user information in your app model using some of your own specific logic. First, you need to develop a custom microflow in your app and select it for the CustomUserProvisioning. | |
334
+
| **CustomAfterSigninLogic** | Checking the box will execute the `CustomAfterSigninLogic microflow`. You can replace the default with your custom microflow below. This microflow runs after a new session is created, allowing you to copy or review data from the original (anonymous) session to the new session or user. This functionality is similar to the after-sign-in microflow in Mendix project security. Only custom microflows starting with 'Custom' will appear in the list. | |
| **EncryptionMethod** | This represents the Encryption Algorithm | SHA256 - RSA |
337
+
| **EncryptionKeyLength** | This constant represents the Encryption length | 2048 bits |
338
+
| Active | After completion of IdP config it will make the Toggle Active | true |
307
339
308
340
Deploy the application and log in with the SSO. For more information, see the [Deploy the Application and Login with SSO](#deploy-application) section above.
0 commit comments