Configure IdPs and SPs with trees
After you have set up the entity providers, you can tailor the SAML 2.0 flow to your business needs by configuring the provider settings.
Redirect to a tree on the hosted SP
For IdP-initiated SSO in integrated mode, you must configure the hosted SP to send the user to an authentication tree after validating the SAML 2.0 assertion from the IdP. This lets you validate the IdP and perform SAML 2.0 authentication on the SP side.
You can also define additional actions the user must fulfill, such as performing multi-factor authentication or checking organizational details before accessing the SAML 2.0 application.
Include a Scripted Decision node in the tree and query the samlApplication binding to access the assertion and response details, which you can then use to validate the IdP.
If a local authentication URL is configured, it takes precedence, but AM doesn’t validate that the specified tree exists on the hosted SP.
If you haven’t configured a tree in either setting, an IdP-initiated SSO SAML flow results in an invalid request error.
For SP-initiated SSO, the flow continues in the originating tree, ignoring any redirect tree configured on the hosted SP.
To configure a redirect tree:
-
Go to Realms > realm name > Applications > Federation > Entity Providers > Hosted SP Name.
-
Under Assertion Processing > Redirect Tree, select the name of your authentication tree from the Redirect Tree Name list.
Learn about the
Redirect Tree Nameproperty in the hosted SP configuration. -
Save your changes.
|
You can’t delete a tree if it’s set as the redirect tree in the hosted SP. |
Set a SAML 2.0 application tree for a remote SP
Configure the remote SP so that a specific authentication tree is always run for users authenticating with your SAML 2.0 app. The SAML flow invokes the associated tree regardless of any existing sessions or requested or configured authentication contexts.
To configure a SAML 2.0 app tree:
-
Go to Realms > realm name > Applications > Federation > Entity Providers > Remote SP Name.
-
Under Advanced > Tree Name, select the name of your authentication tree from the list.
Learn about the
Tree Nameproperty in the remote SP configuration. -
Save your changes.
When you configure an app tree, the processing of the SAML request depends on the authentication context requested by the SP. The following table shows the SAML response for a configured comparison type and the requested authentication context.
| Authentication context | Comparison type | Response |
|---|---|---|
SP requested authn context |
|
Requested authn context included |
SP requested authn context |
|
|
SP doesn’t request authn context |
- |
|
IdP-initiated (no requested authn context) |
- |
|
|