Console terminology: In the Maverics Console, this section is called
Identity Fabric. The YAML configuration uses the
connectors key to define
identity provider integrations.Overview
The Generic SAML connector supports SAML 2.0 SSO profiles including SP-initiated and IdP-initiated flows. It handles SAML assertion parsing, signature validation, and attribute extraction — making it suitable for government and education SAML federations, legacy SAML systems, and any provider that speaks SAML 2.0.Use Cases
- Unify SSO across non-standard IdPs — Connect SAML identity providers that aren’t covered by dedicated connectors, bringing them into a single orchestrated sign-on experience across your hybrid environment
- Government and education federations — Integrate with InCommon, eduGAIN, and other SAML-based federation services that require generic SAML 2.0 support
- Legacy SAML modernization — Extend SSO to older identity systems that only support SAML 2.0, without rewriting applications or migrating users
- IdP resilience for SAML providers — Pair with the Continuity connector to enable failover between SAML identity providers, ensuring authentication availability if a primary IdP becomes unreachable
Setup
- Console UI
- Configuration
To create a Generic SAML connector in the Maverics Console:
- Navigate to Identity Fabric in the Console sidebar.
- Click Create and select Generic SAML.
- Enter a Name — the friendly name for your SAML provider.
- Enter the Metadata URL — the URL of the IdP’s SAML metadata document.
- Enter the Consumer Service (ACS) URL — the Assertion Consumer Service URL where the IdP sends SAML responses.
- Enter the Entity ID — the unique identifier for the Orchestrator as the SAML Service Provider.
- Optionally enter a Logout Callback URL for Single Logout (SLO) callback.
- Optionally enter the SP Certificate Path and SP Private Key Path for signing SAML requests.
- Optionally select a NameID Format to specify the NameID format used in SAML assertions.
- Optionally enable IdP Initiated Login to allow authentication flows started by the identity provider.
- Click Save.
Troubleshooting
- Verify SAML metadata URL is accessible — The Orchestrator fetches the IdP’s metadata XML at startup. If the URL is unreachable or returns an error, the connector will fail to initialize. Test the URL with
curlfrom the Orchestrator host. - Ensure entityID matches the IdP configuration — The
samlEntityIDvalue must match what is configured as the trusted Service Provider on the IdP side. Mismatched entity IDs cause the IdP to reject authentication requests. - Check the Assertion Consumer Service URL — The
samlConsumerServiceURLmust match the Orchestrator’s actual callback endpoint. If behind a load balancer or reverse proxy, use the external-facing URL that the IdP will redirect to. - SP signing certificate errors — If the IdP requires signed authentication requests, ensure
samlSPCertPathandsamlSPKeyPathpoint to valid PEM files and the key matches the certificate.