Tab | Parameter | Description |
|---|---|---|
General | Display Name | Name of the button displayed on the login page for the SAML2 Identity Provider. |
Entity Identifier (Entity Id) | Identity of the Service Provider used when sending requests to the Identity Provider and in metadata. | |
Metadata location | Location of the Identity Provider metadata (URL, absolute path, or relative path, e.g., ~/App_Data/IdpMetadata.xml). By default, the Entity Id is interpreted as the metadata location. | |
Groups Authorized | Allows filtering of HOPEX-related groups. Without filtering, you may encounter HTTP 400 errors due to large cookies generated from retrieved claims. | |
ClaimForRoles | Name of the claim used for the role. | |
ClaimForSub | Name of the claim used for the sub. | |
ModulePath | Application root relative path for the Saml2 Assertion Consumer EndPoint (default: AuthServices). Each configured SAML2 must have a distinct value. | |
Certificate and Signature | Certificate friendly name | Certificate used by the Service Provider for signing or decryption. |
Want assertion signed | Select if you want assertions to be signed. | |
Want AuthnRequests signed | Select if you want AuthRequests sent to the Identity Provider to be signed. | |
Authenticate Request Signing Behavior | Defines AuthRequest signing behavior: • IfIdpWantAuthnRequestsSigned (default): sign only if required by the IdP • always: always sign AuthRequests (AuthnRequestsSigned set to true in metadata) • never: never sign AuthRequests | |
Certificate use | Defines certificate usage: • Both (default) • Signing • Encryption | |
Organization | Name / Email / Url | Information (name, email, URL) describing the organization responsible for the entity. |
Contact | Email | Collection of contacts for the SAML2 entity. |
Parameter | Description |
|---|---|
Display Name | Name of the button displayed on the login page for the OpenID Connect provider. Also used in the calculation of the RedirectURL (specific to OpenID Connect), which is displayed on the login page. |
Authority server URL | Defines the location of the OpenID server. |
Proxy URL | If a proxy is configured on the same server as UAS, this URL defines the outgoing address for the protocol to reach its endpoints (e.g., DiscoveryEndPoint, TokenEndPoint). |
Client Identifier | Identifier of your application. |
Secret client | Authentication method for the client: • Client Secret (less secure) • Certificate defined by a Thumbprint and an Audience (TokenEndPoint URL of your IdentityServer) to read the Access Token via the certificate. |
Scopes | Required scopes for the OpenID server: • openid (mandatory, provides JWT claims) • Additional scopes (e.g., email, profile) for extra claims. |
ClaimForRoles | Name of the claim used for the role. |
ClaimForSub | Name of the claim used for the sub. |
MetadataAddress server URL | DiscoveryEndPoint URL providing metadata of the OpenID Connect provider (token endpoints, scopes, etc.). Typically: [AuthorityServerURL]/.well-known/openid-configuration. Usually not required if Authority Server URL is set. |
Groups Authorized | Allows filtering of HOPEX-related groups. Without filtering, you may encounter HTTP 400 errors due to large cookies generated from retrieved claims. |