Field | Description |
---|---|
SAML Issuer URL | Provided by Multi-Pass |
SAML Login Endpoint | Provided by Multi-Pass |
SAML Logout Endpoint | Provided by Multi-Pass |
SAML Fingerprint | Certificate fingerprint from Multi-Pass (SHA-256) |
SAML Certificate | Public certificate from Multi-Pass |
SAML ARN | Optional, leave empty if not needed |
Exempt from SSO | Add users to bypass SSO (e.g., breakglass account) |
Field | Value |
---|---|
Client Type | SAML |
Client ID | Hudu domain (e.g., https://docs.mywebsite.com) |
Name | hudu (or any name of your choice) |
Description | e.g., SSO Integration |
Always display in UI | ON |
Field | Value |
---|---|
Home URL | https://ca.auth.kzero.com/realms/Randintegration/protocol/saml/clients/hudu |
Valid Redirect URIs | https://docs.mywebsite.com/saml/consume |
IDP-Initiated SSO URL Name | hudu |
Setting | Value |
---|---|
Name ID Format | |
Force POST Binding | ON |
Include AuthnStatement | ON |
Other SAML options | OFF |
Field | Value |
---|---|
SAML Issuer URL | https://ca.auth.kzero.com/realms/<TENANT_NAME> |
SAML Login Endpoint | https://ca.auth.kzero.com/realms/<TENANT_NAME>/protocol/saml |
SAML Logout Endpoint | https://ca.auth.kzero.com/realms/<TENANT_NAME>/protocol/saml |
SAML Fingerprint | SHA-256 fingerprint from the Multi-Pass certificate |
SAML Certificate | The full X.509 certificate from MPAS, wrapped in:-----BEGIN CERTIFICATE----- [certificate] -----END CERTIFICATE----- |