GenAuth DocsDocuments
Concepts
User Guide
Development Integration
AgentAuth
Metadata
Development Integration
Multi-tenant (beta)
Console Documentation
Multi-tenant Console
Tenant Console
Saas Application Demo
Concepts
User Guide
Development Integration
AgentAuth
Metadata
Development Integration
Multi-tenant (beta)
Console Documentation
Multi-tenant Console
Tenant Console
Saas Application Demo
Old version

¶ SAML Identity Source

Update time: 2025-07-23 07:34:21
Edit

¶ Scenario Introduction

  • Overview: Security Assertion Markup Language (SAML, pronounced sam-el) is an open source standard data format based on XML that exchanges authentication and authorization data between parties, especially between identity providers and service providers. SAML2.0 can implement cross-domain single sign-on (SSO) based on the network to reduce the management overhead of distributing multiple authentication tokens to a user.
  • Application scenario: PC website
  • End user preview image:

¶ Notes

  • A service that supports SAML protocol capabilities is required;
  • If you have not opened a GenAuth console account, please go to GenAuth console (opens new window) to register a developer account;

¶ Step 1: Create a SAML identity source

Open the SAML2 identity provider in GenAuth to provide identity assertions for other service providers. Make GenAuth a SAML identity source, and other systems can access GenAuth as an identity provider through the SAML protocol. For details, please refer to: Become a SAML identity source (opens new window).

¶ Step 2: Configure SAML identity source in GenAuth console

2.1 Open GenAuth console and enter the user pool to which you want to connect the SAML identity source, which is called "User Pool B". Select "Connect Identity Source" > "Enterprise Identity Source" in the left menu, and select "Create Enterprise Identity Source" in the right panel.

2.2 Find "SAML" in the right panel and click it.

2.3 Fill in the configuration content required by the SAML protocol according to the SAML configuration requirements.

NumberField/FunctionDescription
2.3.1Unique IDa. The unique ID consists of lowercase letters, numbers, and -, and its length is less than 32 bits. b. This is the unique ID of this connection and cannot be modified after setting.
2.3.2Display NameThis name will be displayed on the button of the end user's login interface.
2.3.3Application LogoThe identity source logo displayed on the login interface button.
2.3.4Verification CertificateThe verification certificate of the SAML Identity Provider.
2.3.5Login URLThe login URL of the SAML Identity Provider.
2.3.6SAML Request SignatureWhether to encrypt the SAML request.
2.3.7SAML Request Signature AlgorithmDefaults to rsa-sha256.
2.3.8SAML Request Digest AlgorithmDefaults to sha256.
2.3.9SAML Request Protocol BindingDefaults to HTTP-Redirect.
2.3.10ACS URLAssertion consumption address.
2.3.11Metadata XML FileAddress of SAML Identity Provider metadata.
2.3.12Login ModeAfter enabling "Login Only Mode", you can only log in to existing accounts, and cannot create new accounts. Please choose carefully.

After configuration is complete, click the "Save" button to complete the creation.

¶ Step 3: Development Access

  • Recommended Development Access Method: Use Hosted Login Page

  • Advantages and Disadvantages: Simple operation and maintenance, GenAuth is responsible for operation and maintenance. Each user pool has an independent secondary domain name; if you need to embed it in your application, you need to log in using the pop-up mode, that is, after clicking the login button, a window will pop up with the login page hosted by GenAuth, or redirect the browser to the login page hosted by GenAuth.

  • Detailed access method:

    3.1 Create an application in the GenAuth console. For details, see: How to create an application in GenAuth.

    3.2 On the created SAML identity source connection details page, open and associate an application created in the GenAuth console.

3.3 Experience SAML enterprise login on the login page

  • Scenario Introduction
  • Notes
  • Step 1: Create a SAML identity source
  • Step 2: Configure SAML identity source in GenAuth console
  • Step 3: Development Access

User identity management

Integrated third-party login
Customized authentication process

Enterprise internal management

Single sign-on
Multi-factor authentication
Permission management

Developer

Development Documentation
GitHub (opens new window)

Company

official@genauth.ai
16th Floor, Building B, Beichen Century Center, Chaoyang District, Beijing (Total)
Room 406, 4th Floor, Block B, No. 200, Tianfu Fifth Street, High-tech Zone, Chengdu (Branch)

© Beijing Steamory Technology Co., Ltd.