Skip to content

Latest commit

 

History

History
149 lines (80 loc) · 9.38 KB

get-saml-2-0-idp-metadata-via-parameter-2c76690.md

File metadata and controls

149 lines (80 loc) · 9.38 KB

Get SAML 2.0 IdP Metadata via Parameter

Tenant administrator can get the SAML 2.0 metadata via specific parameters.

The information in this document is valid only for SAML 2.0 applications.

Context

You can get the SAML 2.0 tenant metadata containing the identity provider (IdP) certificate by calling the https://<tenant ID>.<tenant domain>/saml2/metadata end point and providing one of the following parameters:

Parameters

Parameter

Value

sp_name

The value is the name of the application as it appears in the Name field in the SAML 2.0 Configuration screen in the administration console.

Note:

If you had added a second signing certificate in the administration console tenant settings for a specific service provider (SP), and you chose one of the certificates to be used for that SP, you can retrieve the SAML 2.0 of the Identity Provider (IdP) metadata for that SP, containing the chosen IDP certificate by providing the SP name in the sp-name parameter.

certificates

  • all - gets both signing certificates configured for the tenant

    Remember:

    If you get the metadata with both certificates to update the trust on the identity provider side, information for the second certificate will be used only.

  • default - gets only the default signing certificate configured for the tenant

  • non-default - gets only the non-default signing certificate configured for the tenant

Note:

Tenant ID is an automatically generated ID by the system.

The domain can be accounts.ondemand.com or accounts.cloud.sap

Example:

  • https://mytenant.accounts.ondemand.com/saml2/metadata?sp_name=myapplication or https://mytenant.accounts.sap.cloud/saml2/metadata?sp_name=myapplication
  • https://mytenant.accounts.ondemand.com/saml2/metadata?certificates=all or https://mytenant.accounts.sap.cloud/saml2/metadata?certificates=all

Related Information

Tenant SAML 2.0 Configurations

Rotate Signing Certificates

Tenant OpenID Connect Configurations

Change Tenant Texts Via Administration Console

Configure Master Data Texts Via Administration Console

Configure Links Section on Sign-In Screen

Add Instructions Section on Sign-In Screen

Configure X.509 Client Certificates for User Authentication

Enable Users to Generate and Authenticate with Certificates

Configure Tenant Images

Configure Allowed Logon Identifiers

Configure User Identifier Attributes

Configure Trust this browser Option

Enable Back-Up Channels to Send Passcode for Deactivation of TOTP Two-Factor Authentication Devices

Password Recovery Options

Configure Initial Password and Email Link Validity

Configure Session Timeout

Configure Trusted Domains

Use Custom Domain in Identity Authentication

Change a Tenant's Display Name

Configure Default Risk-Based Authentication for All Applications in the Tenant

Configure Sinch Service in Administration Console

Configure RADIUS Server Settings (Beta)

Configure Mail Server for Application Processes

Configure IdP-Initiated SSO

Send Security Alert Emails

Send System Notifications via Emails

Configure Customer Managed Keys in Administration Console (Restricted Availability)

Configure Default Language for End User Screens

Configure P-User Next Index

Reuse SAP Cloud Identity Services Tenants for Different Customer IDs