Skip to main content

SAML Applications

LumoAuth supports SAML 2.0 as both an Identity Provider (IdP) and can integrate with external SAML Identity Providers. This guide covers registering SAML Service Providers (SPs) to use LumoAuth as their identity source.


LumoAuth as SAML Identity Provider

When LumoAuth acts as the IdP, your applications (Service Providers) redirect users to LumoAuth for authentication, and LumoAuth sends back a SAML assertion confirming the user's identity.

User → Service Provider → LumoAuth (IdP) → Authenticates → SAML Assertion → Service Provider

Registering a SAML Service Provider

Via Portal

  1. Go to /t/{tenantSlug}/portal/configuration/saml-idp
  2. Click Add Service Provider
  3. Configure:
FieldDescriptionExample
NameDisplay nameSalesforce
Entity IDSP's unique SAML identifierhttps://salesforce.com/sp
ACS URLAssertion Consumer Service URLhttps://login.salesforce.com/saml/acs
SLO URLSingle Logout URL (optional)https://login.salesforce.com/saml/slo
Name ID FormatUser identifier formatemailAddress, persistent, transient
Signing CertificateSP's certificate for request verificationUpload .crt file

LumoAuth IdP Metadata

Provide this metadata URL to your Service Provider:

/t/{tenantSlug}/api/v1/saml/idp/metadata

The metadata includes:

  • IdP Entity ID
  • SSO endpoint URL
  • SLO endpoint URL
  • Signing certificate

SAML Endpoints

EndpointURLPurpose
SSO (HTTP-POST)/t/{tenantSlug}/api/v1/saml/idp/ssoReceive authentication requests
SSO (HTTP-Redirect)/t/{tenantSlug}/api/v1/saml/idp/ssoReceive authentication requests
SLO/t/{tenantSlug}/api/v1/saml/idp/sloSingle logout
Metadata/t/{tenantSlug}/api/v1/saml/idp/metadataIdP metadata XML

Attribute Mapping

Configure which user attributes are included in the SAML assertion:

SAML AttributeLumoAuth FieldExample Value
emailUser emailalice@acme.com
firstNameFirst nameAlice
lastNameLast nameSmith
groupsGroup membershipsengineering, admins
rolesRole assignmentseditor, auditor

Custom attribute mappings can be configured per Service Provider to match what each SP expects.


SAML Assertion Example

<saml:Assertion>
<saml:Issuer>https://your-domain.com/t/acme-corp</saml:Issuer>
<saml:Subject>
<saml:NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress">
alice@acme.com
</saml:NameID>
</saml:Subject>
<saml:Conditions>
<saml:AudienceRestriction>
<saml:Audience>https://salesforce.com/sp</saml:Audience>
</saml:AudienceRestriction>
</saml:Conditions>
<saml:AttributeStatement>
<saml:Attribute Name="email">
<saml:AttributeValue>alice@acme.com</saml:AttributeValue>
</saml:Attribute>
<saml:Attribute Name="firstName">
<saml:AttributeValue>Alice</saml:AttributeValue>
</saml:Attribute>
</saml:AttributeStatement>
</saml:Assertion>

Common SP Configurations

Salesforce

SettingValue
Entity IDhttps://your-company.my.salesforce.com
ACS URLhttps://your-company.my.salesforce.com?so=ORGID
Name IDemailAddress

AWS

SettingValue
Entity IDurn:amazon:webservices
ACS URLhttps://signin.aws.amazon.com/saml
Name IDpersistent

Tableau

SettingValue
Entity IDhttps://sso.online.tableau.com/public/sp/metadata
ACS URLYour Tableau Online SSO URL
Name IDemailAddress