2014-10-22 19:18:24 +00:00
<chapter id= "saml" >
<title > SAML SSO</title>
<para >
Keycloak supports SAML 2.0 for registered applications. Both POST and Redirect bindings are supported. You can choose
to require client signature validation and can have the server sign and/or encrypt responses as well. We do not
yet support logout via redirects. All logouts happen via a background POST binding request to the application
that will be logged out. We do not support SAML 1.1 either. If you want support for either of those, please
log a JIRA request and we'll schedule it.
</para>
<para >
When you create an application in the admin console, you can choose which protocol the application will log in with.
In the application create screen, choose <literal > saml</literal> from the protocol list. After that there
are a bunch of configuration options. Here is a description of each item:
</para>
<para >
<variablelist >
<varlistentry >
<term > Include AuthnStatement</term>
<listitem >
<para >
2015-01-13 18:50:44 +00:00
SAML login responses may specify the authentication method used (password, etc.) as well as
2014-10-22 19:18:24 +00:00
a timestamp of the login. Setting this to on will include that statement in the response document.
</para>
</listitem>
</varlistentry>
<varlistentry >
<term > Multi-valued Roles</term>
<listitem >
<para >
2015-01-13 18:50:44 +00:00
If this switch is off, any user role mappings will have a corresponding attribute created for it.
2014-10-22 19:18:24 +00:00
If this switch is turn on, only one role attribute will be created, but it will have
multiple values within in.
</para>
</listitem>
</varlistentry>
<varlistentry >
<term > Sign Documents</term>
<listitem >
<para >
When turned on, Keycloak will sign the document using the realm's private key.
</para>
</listitem>
</varlistentry>
<varlistentry >
<term > Sign Assertions</term>
<listitem >
<para >
With the <literal > Sign Documents</literal> switch signs the whole document. With this setting
you just assign the assertions of the document.
</para>
</listitem>
</varlistentry>
<varlistentry >
<term > Signature Algorithm</term>
<listitem >
<para >
Choose between a variety of algorithms for signing SAML documents.
</para>
</listitem>
</varlistentry>
<varlistentry >
<term > Encrypt Assertions</term>
<listitem >
<para >
Encrypt assertions in SAML documents with the realm's private key. The AES algorithm is used
with a key size of 128 bits.
</para>
</listitem>
</varlistentry>
<varlistentry >
<term > Client Signature Required</term>
<listitem >
<para >
Expect that documents coming from a client are signed. Keycloak will validate this signature
using the client keys set up in the <literal > Application Keys</literal> submenu item.
</para>
</listitem>
</varlistentry>
<varlistentry >
<term > Force POST Binding</term>
<listitem >
<para >
By default, Keycloak will respond using the initial SAML binding of the original request. By turning
on this switch, you will force Keycloak to always respond using the SAML POST Binding even if the
2015-01-13 18:50:44 +00:00
original request was the Redirect binding.
2014-10-22 19:18:24 +00:00
</para>
</listitem>
</varlistentry>
2015-02-06 14:28:00 +00:00
<varlistentry >
<term > Front Channel Logout</term>
<listitem >
<para >
If true, this application requires a browser redirect to be able to perform a logout. For example,
the application may require a cookie to be reset which could only be done by a done via a redirect.
If this switch is false, then Keycloak will invoke a background SAML request to logout the application.
</para>
</listitem>
</varlistentry>
2014-10-22 19:18:24 +00:00
</variablelist>
</para>
2014-10-28 16:16:54 +00:00
<para >
You have to specify an admin URL if you want logout to work. This should be a URL that will except single logout
requests from the Keycloak server. You should also specify a default redirect url. Keycloak will redirect to this
url after single logout is complete.
</para>
2014-10-22 19:18:24 +00:00
<para >
One thing to note is that roles are not treated as a hierarchy. So, any role mappings will just be added
2014-10-28 16:16:54 +00:00
to the role attributes in the SAML document using their basic name. So, if you have multiple application roles
2014-10-22 19:18:24 +00:00
you might have name collisions. You can use the Scope Mapping menu item to control which role mappings are set
in the response.
</para>
2014-10-28 16:16:54 +00:00
<section >
2014-10-28 16:49:31 +00:00
<title > SAML Entity Descriptor</title>
2014-10-28 16:16:54 +00:00
<para >
If you go into the admin console in the application list menu page you will see an <literal > Import</literal>
button. If you click on that you can import SAML Service Provider definitions using the <ulink url= "http://docs.oasis-open.org/security/saml/v2.0/saml-metadata-2.0-os.pdf" > Entity Descriptor</ulink>
format described in SAML 2.0. You should review all the information there to make sure everything is set up correctly.
</para>
2014-10-28 16:49:31 +00:00
<para >
Each realm has a URL where you can view the XML entity descriptor for the IDP. <literal > root/realms/{realm}/protocol/saml/descriptor</literal>
</para>
2014-10-28 16:16:54 +00:00
</section>
2014-10-22 19:18:24 +00:00
</chapter>