From 89c93f687154bd26a5cc67d5136ca44386409a4d Mon Sep 17 00:00:00 2001
From: redrover02 <36289069+redrover02@users.noreply.github.com>
Date: Thu, 20 Jun 2024 17:02:20 -0400
Subject: [PATCH 1/3] Update set-up-saml.md
Adding clarification of the information to include when pasting the X509 certificate.
---
docs/manage/security/saml/set-up-saml.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/docs/manage/security/saml/set-up-saml.md b/docs/manage/security/saml/set-up-saml.md
index f931c0d015..413522c9e7 100644
--- a/docs/manage/security/saml/set-up-saml.md
+++ b/docs/manage/security/saml/set-up-saml.md
@@ -66,7 +66,7 @@ Follow these steps to configure IdP-initiated login. After this procedure, you c
1. **Configuration Name**. Enter a name to identify the SSO policy (or another name used internally to describe the policy).
1. **Debug Mode**. Select this option if you'd like to view additional details if an error occurs when a user attempts to authenticate. For more information, see [View SAML Debug Information](view-saml-debug-information.md).
1. **Issuer**. Enter the unique URL assigned to your organization by the SAML IdP.
ADFS example: `http://adfs.myserver.tld/adfs/services/trust`
-1. **X.509 Certificate**:.Copy and paste your organization's X.509 certificate, which is used to verify signatures in SAML assertions. For ADFS, the certificate required is the Token-signing ADFS X.509 certificate.
+1. **X.509 Certificate**:.Copy and paste your organization's X.509 certificate, which is used to verify signatures in SAML assertions. For ADFS, the certificate required is the Token-signing ADFS X.509 certificate. The certificate must include the hash text including "-----BEGIN CERTIFICATE-----" and "-----END CERTIFICATE-----".
1. **Attribute Mapping**. Depending on your IdP, select:
* **Use SAML subject**
* **Use SAML attribute** and type the email attribute name in the text box.
From 11ed2453b1853d7545f25c9c4f01529d73b60972 Mon Sep 17 00:00:00 2001
From: "John Pipkin (Sumo Logic)"
Date: Fri, 21 Jun 2024 09:11:05 -0500
Subject: [PATCH 2/3] Update docs/manage/security/saml/set-up-saml.md
---
docs/manage/security/saml/set-up-saml.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/docs/manage/security/saml/set-up-saml.md b/docs/manage/security/saml/set-up-saml.md
index 413522c9e7..cf1575fd05 100644
--- a/docs/manage/security/saml/set-up-saml.md
+++ b/docs/manage/security/saml/set-up-saml.md
@@ -66,7 +66,7 @@ Follow these steps to configure IdP-initiated login. After this procedure, you c
1. **Configuration Name**. Enter a name to identify the SSO policy (or another name used internally to describe the policy).
1. **Debug Mode**. Select this option if you'd like to view additional details if an error occurs when a user attempts to authenticate. For more information, see [View SAML Debug Information](view-saml-debug-information.md).
1. **Issuer**. Enter the unique URL assigned to your organization by the SAML IdP.
ADFS example: `http://adfs.myserver.tld/adfs/services/trust`
-1. **X.509 Certificate**:.Copy and paste your organization's X.509 certificate, which is used to verify signatures in SAML assertions. For ADFS, the certificate required is the Token-signing ADFS X.509 certificate. The certificate must include the hash text including "-----BEGIN CERTIFICATE-----" and "-----END CERTIFICATE-----".
+1. **X.509 Certificate**:.Copy and paste your organization's X.509 certificate, which is used to verify signatures in SAML assertions. For ADFS, the certificate required is the Token-signing ADFS X.509 certificate. The certificate must include the hash text including `-----BEGIN CERTIFICATE-----` and `-----END CERTIFICATE-----`.
1. **Attribute Mapping**. Depending on your IdP, select:
* **Use SAML subject**
* **Use SAML attribute** and type the email attribute name in the text box.
From a69000baf9aa0bb0fa4c68962135c1bf0d8e483a Mon Sep 17 00:00:00 2001
From: "John Pipkin (Sumo Logic)"
Date: Fri, 21 Jun 2024 09:51:30 -0500
Subject: [PATCH 3/3] Update docs/manage/security/saml/set-up-saml.md
---
docs/manage/security/saml/set-up-saml.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/docs/manage/security/saml/set-up-saml.md b/docs/manage/security/saml/set-up-saml.md
index cf1575fd05..8d324766a3 100644
--- a/docs/manage/security/saml/set-up-saml.md
+++ b/docs/manage/security/saml/set-up-saml.md
@@ -66,7 +66,7 @@ Follow these steps to configure IdP-initiated login. After this procedure, you c
1. **Configuration Name**. Enter a name to identify the SSO policy (or another name used internally to describe the policy).
1. **Debug Mode**. Select this option if you'd like to view additional details if an error occurs when a user attempts to authenticate. For more information, see [View SAML Debug Information](view-saml-debug-information.md).
1. **Issuer**. Enter the unique URL assigned to your organization by the SAML IdP.
ADFS example: `http://adfs.myserver.tld/adfs/services/trust`
-1. **X.509 Certificate**:.Copy and paste your organization's X.509 certificate, which is used to verify signatures in SAML assertions. For ADFS, the certificate required is the Token-signing ADFS X.509 certificate. The certificate must include the hash text including `-----BEGIN CERTIFICATE-----` and `-----END CERTIFICATE-----`.
+1. **X.509 Certificate**. Copy and paste your organization's X.509 certificate, which is used to verify signatures in SAML assertions. For ADFS, the certificate required is the Token-signing ADFS X.509 certificate. The certificate must include the hash text including `-----BEGIN CERTIFICATE-----` and `-----END CERTIFICATE-----`.
1. **Attribute Mapping**. Depending on your IdP, select:
* **Use SAML subject**
* **Use SAML attribute** and type the email attribute name in the text box.