Security Assertion Markup Language (SAML) is a data format for exchanging authentication and authorization data between Sencha Web Application Client and Sencha Web Application Manager service provider.
For more information on SAML, see http://en.wikipedia.org/wiki/SAML_2.0.
When a user enters an organization, Sencha Web Application Client sends the user to the appropriate identity provider (IdP). Sencha Web Application Client uses an HTTP redirect for SAML requests and an HTTP post for SAML responses.
SAML Settings
To enable SAML authentication support in Sencha Web Application Manager, select SAML 2.0 in Sencha Web Application Manager > Settings > Authentication.
The following provide information on Sencha Web Application Manager Authentication Settings. See also Authentication Settings.
Endpoint URL
The URL to send the SAML authentication request. You can usually find this URL in your IdP’s federationmetadata.xml
file in the SingleSignOnService
node.
Certificate
An X.509 certificate in PEM format.
Attribute Presets
Commonly used attribute names for certain IdPs.
Note: An invalid or missing attribute won’t prevent a user from being added.
Email Attribute
The attribute name used to denote the user’s email address.
First Name Attribute
The attribute name used to denote the user’s first name.
Last Name Attribute
The attribute name used to denote the user’s last name.