diff --git a/docs/manage/security/saml/set-up-saml.md b/docs/manage/security/saml/set-up-saml.md index f931c0d015..8d324766a3 100644 --- a/docs/manage/security/saml/set-up-saml.md +++ b/docs/manage/security/saml/set-up-saml.md @@ -66,7 +66,7 @@ Follow these steps to configure IdP-initiated login. After this procedure, you c 1. **Configuration Name**. Enter a name to identify the SSO policy (or another name used internally to describe the policy). 1. **Debug Mode**. Select this option if you'd like to view additional details if an error occurs when a user attempts to authenticate. For more information, see [View SAML Debug Information](view-saml-debug-information.md). 1. **Issuer**. Enter the unique URL assigned to your organization by the SAML IdP. 
ADFS example: `http://adfs.myserver.tld/adfs/services/trust` -1. **X.509 Certificate**:.Copy and paste your organization's X.509 certificate, which is used to verify signatures in SAML assertions. For ADFS, the certificate required is the Token-signing ADFS X.509 certificate. +1. **X.509 Certificate**. Copy and paste your organization's X.509 certificate, which is used to verify signatures in SAML assertions. For ADFS, the certificate required is the Token-signing ADFS X.509 certificate. The certificate must include the hash text including `-----BEGIN CERTIFICATE-----` and `-----END CERTIFICATE-----`. 1. **Attribute Mapping**. Depending on your IdP, select:  * **Use SAML subject** * **Use SAML attribute** and type the email attribute name in the text box.