Console terminology: In the Maverics Console, the combination of applications,
policies, headers, and connector bindings is managed through User Flows. In
YAML, these elements are configured directly within each app’s configuration block
under
apps[].policies[].Use Cases
- SAML federation for enterprise apps — Provide SAML 2.0 assertions to enterprise applications like Salesforce, ServiceNow, and Workday that require SAML-based single sign-on.
- Protocol translation (OIDC-to-SAML) — Bridge modern OIDC identity providers to legacy SAML-dependent applications without modifying either side.
- IdP migration for SAML-dependent apps — Migrate SAML service providers from one identity provider to another with zero downtime and no SP reconfiguration.
- Attribute mapping and enrichment — Enrich SAML assertions with attributes sourced from multiple directories, databases, and APIs beyond what the upstream IdP provides.
How It Works
The SAML Provider authentication flow follows these steps:- SP-initiated request — A user accesses a SAML service provider. The SP generates a SAML AuthnRequest and redirects the user to the Orchestrator’s SSO endpoint.
- Upstream authentication — The Orchestrator routes the user to the configured upstream identity provider for authentication. The upstream IdP can use any protocol (OIDC, SAML, LDAP) — the Orchestrator handles protocol translation.
- Attribute enrichment — After authentication, the Orchestrator loads additional attributes from configured attribute providers and merges them with the authenticated identity.
- Assertion generation — The Orchestrator generates a signed SAML assertion containing the NameID and mapped claims from the authenticated identity and enriched attributes.
- SP receives assertion — The SAML response (containing the signed assertion) is POSTed to the SP’s assertion consumer service URL. The SP validates the signature and establishes a session.
- IdP-initiated flow (optional) — Users can also start from the Orchestrator’s IdP-initiated login URL, which generates an assertion and sends it directly to the SP without an AuthnRequest.
Key Concepts
Provider vs Apps
The SAML Provider has two configuration levels: provider-level settings (issuer, SSO/SLO endpoints, signing material) shared across all SAML apps, and individual app entries that each register a specific service provider with its own entity ID, ACS URL, NameID format, and claims mapping.Protocol Translation
The Orchestrator can translate between protocols — an upstream OIDC identity provider can feed a downstream SAML service provider, or vice versa. The service provider only sees SAML; the identity provider only sees OIDC. This makes IdP migration possible without changing SP configurations.Assertion Signing
By default, both the SAML assertion and the SAML response are signed using the provider’s signing material. Individual apps can override signing behavior (e.g., disable assertion signing for SPs that don’t verify it) or use per-app signing keys.NameID and Claims
The NameID identifies the authenticated subject in the SAML assertion. Claims mapping uses the sameconnector.attribute format as OIDC, translating connector attributes into SAML assertion attributes.
Request Verification
When service providers sign their AuthnRequest messages, the Orchestrator verifies the signature using the SP’s certificate. This can be skipped for SPs that don’t sign requests.Setup
- Console UI
- Configuration
In the Maverics Console, SAML Provider settings are configured in the Deployment Settings dialog under the SAML Provider section.Issuer and Endpoints
Signing
Additional Settings
| Field | Required | Description |
|---|---|---|
| Issuer | Yes | Unique SAML IdP identifier (Entity ID). Typically the base URL of the Orchestrator. |
| Generate | — | Button that auto-generates endpoint URLs from the Issuer. |
| Metadata | No | SAML metadata endpoint URL (auto-generated from Issuer). |
| Single Sign-on | Yes | SSO endpoint URL for receiving AuthnRequest messages (auto-generated). |
| Single Logout | Yes | SLO endpoint URL (auto-generated). |
| Field | Required | Description |
|---|---|---|
| Signing Option | Yes | Dropdown to select what is signed. Options: “Response and Assertion” (default), “Response Only”, “Assertion Only”. |
| Edit | — | Button to edit the private key and public key (certificate) pair used for signing SAML responses and assertions. The signature properties can be overridden per-app. |
| Field | Required | Description |
|---|---|---|
| Redis Cache | No | Dropdown to select a configured Redis cache for SAML request data and provider state storage. Defaults to in-memory if not set. |
The Console UI provides a subset of the full YAML configuration. Per-app signature overrides, assertion encryption settings, and advanced request verification options are configured at the app level and are only available in YAML. See the Configuration tab for the complete reference.
Related Integrations
The SAML Provider mode works with all Identity Fabric connectors. The Orchestrator translates between any upstream IdP protocol and SAML assertions for your applications. These are the most commonly used pairings:Microsoft Entra ID
Microsoft Entra ID for enterprise SSO
Okta
Okta SSO consolidation
Generic SAML
Any SAML 2.0-compliant provider
Generic OIDC
Any OIDC provider (protocol translated to SAML)
Continuity
IdP failover and migration
- Secret Providers — Store signing certificates and encryption keys securely
Related Pages
SAML App
SAML app configuration reference, Console UI setup, and troubleshooting
OIDC Provider
Configure the Orchestrator as an OpenID Connect authorization server
Identity Fabric
Connect upstream identity providers to the Orchestrator
Architecture and Concepts
Understand how modes fit into the Orchestrator architecture
HTTP Proxy
Protect applications without code modification using reverse proxy mode