Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

All deployments MUST support the SAML V2.0 Web Browser SSO Profile [ref] as specified in this document. A deployment indicates support for SAML V2.0 Web Browser SSO by including certain browser-facing SSO endpoints in metadata.

((What about SLOthe SAML V2.0 Single Logout Profile? Is a deployment required to support SLO? In any case, what endpoints in metadata are required and/or recommended?))

((Do we have anything to say about the SAML V2.0 Artifact Resolution Profile?))

SP-Initiated SSO

Service Providers must support the direct generation of authentication request messages conforming to the SAML Authentication Request Protocol [SAML Core, 3.4].

...

Addresses: Deployment Issue 9, 46; saml2int section: 8.1, 9.1

Keys in

...

Metadata

Public keys used for encryption and signature verification are bound to certificates in metadata. Certificates SHOULD be communicated using long-lived , unexpired, and self-signed certificates. This is recommended to To avoid problems with libraries that will not allow processing of expired certificatescertain non-conforming SAML implementations, certificates in metadata SHOULD NOT be expired.

Addresses: Deployment Issue 12; saml2int section: 5

Endpoints in Metadata

IdP metadata MUST include a SingleSignOnService endpoint that supports the SAML2 HTTP-Redirect binding. A SingleSignOnService endpoint that supports the SAML2 HTTP-POST binding SHOULD also be included in IdP metadata since some SAML SP deployments favor that particular binding. Support for both bindings is strongly RECOMMENDED.

An SP that supports SAML V2.0 Web Browser SSO MUST include at least one AssertionConsumerService endpoint that supports the SAML V2.0 HTTP-POST binding. Occasionally an IdP will prefer to respond with an artifact, and therefore an AssertionConsumerService endpoint that supports the SAML V2.0 HTTP-Artifact binding MAY also be included in SP metadata. Note: An SP that supports artifact resolution MUST have at least one use="signing" certificate in metadata.

Authentication Context requests

...