Configuration of the main SAML IdP
VIMP enables the connection of any number of IdPs. If you want to connect only one IdP, it has to be defined in the configuration under Authentication -> SAML. Further IdPs can then be added via the top menu item "SAML IdPs".
The following configuration options are available by default:
Name of IdP we connect to (e.g. SAML IdP).
IdP Display Name
Name of the IdP as it is displayed in the frontend (e.g. in the IdP selection).
Activates the debug mode. This should always be deactivated in production environments!
Rejects unsigned or unencrypted messages if they are expected to be signed or encrypted.
Specifies constraints on the name identifier to be used to represent the requested subject (e.g. urn:oasis:names:tc:SAML:2.0:nameid-format:persistent).
The URI to the IdP Host (e.g. https://YOUR_IDP_DOMAIN.com).
IdP Entity ID
IdP URI to initiate authentication request
IdP URI to initiate a logout
The X509 signing certificate. The certificate is provided by your IdP.
Encryption specific certificate. The certificate is provided by your IdP.
Username (Field Mapping defaults to uid)
Mail (Field Mapping defaults to mail)
First name (Field Mapping defaults to givenName)
Last name/Surname (Field Mapping defaults to surName)
Retrieve server attributes
Indicates how the parameters will be retrieved from the sls request for signature validation.
Trust proxy headers
If true, then the Saml lib will trust proxy headers e.g X-Forwarded-Proto / HTTP_X_FORWARDED_PROTO. This is useful if your application is running behind a load balancer which terminates SSL.
Indicates that the nameID of the <samlp:logoutRequest> sent by this SP will be encrypted.
Authn request signed
Indicates whether the <samlp:AuthnRequest> messages sent by this SP will be signed.
Logout request signed
Indicates whether the <samlp:logoutRequest> messages sent by this SP will be signed.
Logout response signed
Indicates whether the <samlp:logoutResponse> messages sent by this SP will be signed.
Indicates wheter metatdata should be signed.
Want messages signed
Indicates a requirement for the <samlp:Response>, <samlp:LogoutRequest> and <samlp:LogoutResponse> elements received by this SP to be signed.
Want assertions signed
Indicates a requirement for the <saml:Assertion> elements received by this SP to be signed.
Want nameID encrypted
Indicates a requirement for the NameID received by this SP to be encrypted.
Requested authn context
Set to false and no AuthContext will be sent in the AuthNRequest / Set true or don't present thi parameter and you will get an AuthContext 'exact' 'urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport / Set an array with the possible auth context values: array ('urn:oasis:names:tc:SAML:2.0:ac:classes:Password', 'urn:oasis:names:tc:SAML:2.0:ac:classes:X509')
Support contact name
Name of contact for support
Support contact mail
E-mail address of contact for support
Technical contact name
Name of contact for technical questions
Technical contact mail
E-mail address of contact for technical questions
Name of your company
Company display name
Displayed name of your company
URI of your company
Enable these IdP settings in login form
If true, this IdP appears for selection in the login form.
Last update on 2020/10/29 by Admin.