Skip to content

SAML 2.0 Configuration

TL;DR;

  • The SAML Sign-In URL for BadIdP is https://api.badidp.com/saml/sso
  • The certificate used for signing assertion responses can be downloaded from https://api.badidp.com/saml/certificate and, if needed, the full IdP metadata can be downloaded from https://api.badidp.com/saml/metadata
  • BadIdP will respond adequately to either the HTTP-Redirect or HTTP-Post SAML request protocol bindings
  • BadIdP does not verify SAML assertion request signatures, so you may configure your service provider's assertion signing settings however you would like e.g. assertion signing enabled or disabled, and any request signing algorithm (if applicable), along with any request signing digest algorithm (if applicable)

Integration Parameters

Sign-In URL

You must provide your service provider with the SAML Sign-In URL SAML. The value should be https://api.badidp.com/saml/sso.

Assertion Response Signing Certificate

You likely need to provide your service provider with the certificate that BadIdP uses for signing assertion responses. You can download the certificate from https://api.badidp.com/saml/certificate.

SAML Flow Support

Request BindingResponse BindingCommon Flow Name / AliasValid SAMLBadIdP Support
HTTP-RedirectHTTP-POST (default)Standard Web SSO
HTTP-POSTHTTP-POST (default)POST → POST
HTTP-ArtifactHTTP-Artifact (default)Artifact Binding
HTTP-RedirectHTTP-ArtifactRedirect → Artifact
HTTP-POSTHTTP-ArtifactPOST → Artifact
HTTP-ArtifactHTTP-POSTArtifact → POST (nonstandard)
HTTP-RedirectHTTP-RedirectINVALID
HTTP-POSTHTTP-RedirectINVALID
HTTP-ArtifactHTTP-RedirectINVALID
InvalidBindingHTTP-POSTInvalid Request Binding
HTTP-POSTInvalidBindingInvalid Response Binding
InvalidBindingInvalidBindingInvalid Request & Response