Skip to main content
The SAML Provider mode configures the Maverics Orchestrator as a SAML 2.0 identity provider. It handles SAML assertion generation, attribute mapping, and protocol translation — allowing you to federate enterprise applications that depend on SAML while connecting to modern or legacy upstream identity providers.
Console terminology: In the Maverics Console, the combination of applications, policies, headers, and connector bindings is managed through User Flows. In YAML, these elements are configured directly within each app’s configuration block under apps[].policies[].
When to use this mode
  • SAML Provider — Choose this mode for applications that only support SAML 2.0. Best for enterprise apps with rigid SAML requirements.
  • OIDC Provider — Choose this mode for modern applications that can consume OpenID Connect tokens natively.
  • HTTP Proxy — Choose this mode for applications that cannot handle SAML directly or where you cannot modify authentication code.
  • LDAP Provider — Choose this mode for applications that require an LDAP directory for authentication.
  • AI Identity Gateway — Choose this mode for securing AI agent-to-tool communication via MCP.

Use Cases

  • SAML federation for enterprise apps — Provide SAML 2.0 assertions to enterprise applications like Salesforce, ServiceNow, and Workday that require SAML-based single sign-on.
  • Protocol translation (OIDC-to-SAML) — Bridge modern OIDC identity providers to legacy SAML-dependent applications without modifying either side.
  • IdP migration for SAML-dependent apps — Migrate SAML service providers from one identity provider to another with zero downtime and no SP reconfiguration.
  • Attribute mapping and enrichment — Enrich SAML assertions with attributes sourced from multiple directories, databases, and APIs beyond what the upstream IdP provides.

How It Works

The SAML Provider authentication flow follows these steps:
  1. SP-initiated request — A user accesses a SAML service provider. The SP generates a SAML AuthnRequest and redirects the user to the Orchestrator’s SSO endpoint.
  2. Upstream authentication — The Orchestrator routes the user to the configured upstream identity provider for authentication. The upstream IdP can use any protocol (OIDC, SAML, LDAP) — the Orchestrator handles protocol translation.
  3. Attribute enrichment — After authentication, the Orchestrator loads additional attributes from configured attribute providers and merges them with the authenticated identity.
  4. Assertion generation — The Orchestrator generates a signed SAML assertion containing the NameID and mapped claims from the authenticated identity and enriched attributes.
  5. SP receives assertion — The SAML response (containing the signed assertion) is POSTed to the SP’s assertion consumer service URL. The SP validates the signature and establishes a session.
  6. IdP-initiated flow (optional) — Users can also start from the Orchestrator’s IdP-initiated login URL, which generates an assertion and sends it directly to the SP without an AuthnRequest.

Key Concepts

Provider vs Apps

The SAML Provider has two configuration levels: provider-level settings (issuer, SSO/SLO endpoints, signing material) shared across all SAML apps, and individual app entries that each register a specific service provider with its own entity ID, ACS URL, NameID format, and claims mapping.

Protocol Translation

The Orchestrator can translate between protocols — an upstream OIDC identity provider can feed a downstream SAML service provider, or vice versa. The service provider only sees SAML; the identity provider only sees OIDC. This makes IdP migration possible without changing SP configurations.

Assertion Signing

By default, both the SAML assertion and the SAML response are signed using the provider’s signing material. Individual apps can override signing behavior (e.g., disable assertion signing for SPs that don’t verify it) or use per-app signing keys.

NameID and Claims

The NameID identifies the authenticated subject in the SAML assertion. Claims mapping uses the same connector.attribute format as OIDC, translating connector attributes into SAML assertion attributes.

Request Verification

When service providers sign their AuthnRequest messages, the Orchestrator verifies the signature using the SP’s certificate. This can be skipped for SPs that don’t sign requests.

Setup

In the Maverics Console, SAML Provider settings are configured in the Deployment Settings dialog under the SAML Provider section.Issuer and Endpoints
FieldRequiredDescription
IssuerYesUnique SAML IdP identifier (Entity ID). Typically the base URL of the Orchestrator.
GenerateButton that auto-generates endpoint URLs from the Issuer.
MetadataNoSAML metadata endpoint URL (auto-generated from Issuer).
Single Sign-onYesSSO endpoint URL for receiving AuthnRequest messages (auto-generated).
Single LogoutYesSLO endpoint URL (auto-generated).
Signing
FieldRequiredDescription
Signing OptionYesDropdown to select what is signed. Options: “Response and Assertion” (default), “Response Only”, “Assertion Only”.
EditButton to edit the private key and public key (certificate) pair used for signing SAML responses and assertions. The signature properties can be overridden per-app.
Additional Settings
FieldRequiredDescription
Redis CacheNoDropdown to select a configured Redis cache for SAML request data and provider state storage. Defaults to in-memory if not set.
The Console UI provides a subset of the full YAML configuration. Per-app signature overrides, assertion encryption settings, and advanced request verification options are configured at the app level and are only available in YAML. See the Configuration tab for the complete reference.
The SAML Provider mode works with all Identity Fabric connectors. The Orchestrator translates between any upstream IdP protocol and SAML assertions for your applications. These are the most commonly used pairings: See the connector compatibility matrix for all supported pairings and the Identity Fabric overview for the full connector list. The SAML Provider also pairs with: