From 89c93f687154bd26a5cc67d5136ca44386409a4d Mon Sep 17 00:00:00 2001 From: redrover02 <36289069+redrover02@users.noreply.github.com> Date: Thu, 20 Jun 2024 17:02:20 -0400 Subject: [PATCH 1/3] Update set-up-saml.md Adding clarification of the information to include when pasting the X509 certificate. --- docs/manage/security/saml/set-up-saml.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/manage/security/saml/set-up-saml.md b/docs/manage/security/saml/set-up-saml.md index f931c0d015..413522c9e7 100644 --- a/docs/manage/security/saml/set-up-saml.md +++ b/docs/manage/security/saml/set-up-saml.md @@ -66,7 +66,7 @@ Follow these steps to configure IdP-initiated login. After this procedure, you c 1. **Configuration Name**. Enter a name to identify the SSO policy (or another name used internally to describe the policy). 1. **Debug Mode**. Select this option if you'd like to view additional details if an error occurs when a user attempts to authenticate. For more information, see [View SAML Debug Information](view-saml-debug-information.md). 1. **Issuer**. Enter the unique URL assigned to your organization by the SAML IdP. 
ADFS example: `http://adfs.myserver.tld/adfs/services/trust` -1. **X.509 Certificate**:.Copy and paste your organization's X.509 certificate, which is used to verify signatures in SAML assertions. For ADFS, the certificate required is the Token-signing ADFS X.509 certificate. +1. **X.509 Certificate**:.Copy and paste your organization's X.509 certificate, which is used to verify signatures in SAML assertions. For ADFS, the certificate required is the Token-signing ADFS X.509 certificate. The certificate must include the hash text including "-----BEGIN CERTIFICATE-----" and "-----END CERTIFICATE-----". 1. **Attribute Mapping**. Depending on your IdP, select:  * **Use SAML subject** * **Use SAML attribute** and type the email attribute name in the text box. From 11ed2453b1853d7545f25c9c4f01529d73b60972 Mon Sep 17 00:00:00 2001 From: "John Pipkin (Sumo Logic)" Date: Fri, 21 Jun 2024 09:11:05 -0500 Subject: [PATCH 2/3] Update docs/manage/security/saml/set-up-saml.md --- docs/manage/security/saml/set-up-saml.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/manage/security/saml/set-up-saml.md b/docs/manage/security/saml/set-up-saml.md index 413522c9e7..cf1575fd05 100644 --- a/docs/manage/security/saml/set-up-saml.md +++ b/docs/manage/security/saml/set-up-saml.md @@ -66,7 +66,7 @@ Follow these steps to configure IdP-initiated login. After this procedure, you c 1. **Configuration Name**. Enter a name to identify the SSO policy (or another name used internally to describe the policy). 1. **Debug Mode**. Select this option if you'd like to view additional details if an error occurs when a user attempts to authenticate. For more information, see [View SAML Debug Information](view-saml-debug-information.md). 1. **Issuer**. Enter the unique URL assigned to your organization by the SAML IdP. 
ADFS example: `http://adfs.myserver.tld/adfs/services/trust` -1. **X.509 Certificate**:.Copy and paste your organization's X.509 certificate, which is used to verify signatures in SAML assertions. For ADFS, the certificate required is the Token-signing ADFS X.509 certificate. The certificate must include the hash text including "-----BEGIN CERTIFICATE-----" and "-----END CERTIFICATE-----". +1. **X.509 Certificate**:.Copy and paste your organization's X.509 certificate, which is used to verify signatures in SAML assertions. For ADFS, the certificate required is the Token-signing ADFS X.509 certificate. The certificate must include the hash text including `-----BEGIN CERTIFICATE-----` and `-----END CERTIFICATE-----`. 1. **Attribute Mapping**. Depending on your IdP, select:  * **Use SAML subject** * **Use SAML attribute** and type the email attribute name in the text box. From a69000baf9aa0bb0fa4c68962135c1bf0d8e483a Mon Sep 17 00:00:00 2001 From: "John Pipkin (Sumo Logic)" Date: Fri, 21 Jun 2024 09:51:30 -0500 Subject: [PATCH 3/3] Update docs/manage/security/saml/set-up-saml.md --- docs/manage/security/saml/set-up-saml.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/manage/security/saml/set-up-saml.md b/docs/manage/security/saml/set-up-saml.md index cf1575fd05..8d324766a3 100644 --- a/docs/manage/security/saml/set-up-saml.md +++ b/docs/manage/security/saml/set-up-saml.md @@ -66,7 +66,7 @@ Follow these steps to configure IdP-initiated login. After this procedure, you c 1. **Configuration Name**. Enter a name to identify the SSO policy (or another name used internally to describe the policy). 1. **Debug Mode**. Select this option if you'd like to view additional details if an error occurs when a user attempts to authenticate. For more information, see [View SAML Debug Information](view-saml-debug-information.md). 1. **Issuer**. Enter the unique URL assigned to your organization by the SAML IdP. 
ADFS example: `http://adfs.myserver.tld/adfs/services/trust` -1. **X.509 Certificate**:.Copy and paste your organization's X.509 certificate, which is used to verify signatures in SAML assertions. For ADFS, the certificate required is the Token-signing ADFS X.509 certificate. The certificate must include the hash text including `-----BEGIN CERTIFICATE-----` and `-----END CERTIFICATE-----`. +1. **X.509 Certificate**. Copy and paste your organization's X.509 certificate, which is used to verify signatures in SAML assertions. For ADFS, the certificate required is the Token-signing ADFS X.509 certificate. The certificate must include the hash text including `-----BEGIN CERTIFICATE-----` and `-----END CERTIFICATE-----`. 1. **Attribute Mapping**. Depending on your IdP, select:  * **Use SAML subject** * **Use SAML attribute** and type the email attribute name in the text box.