Skip to content

SAML 2.0

Spec: OASIS SAML 2.0Status: Partial

SAML 2.0 support is provided by @authhero/saml and is used for both inbound federation (AuthHero acting as SP to an external IdP) and outbound SSO (AuthHero acting as IdP to downstream SAML SPs).

Implemented

  • AuthHero as SAML IdP/samlp/{client_id} endpoint accepts AuthnRequest and issues signed SAML responses.
  • Metadata/samlp/metadata/{client_id} publishes IdP metadata XML.
  • HTTP-POST binding — SAML responses are delivered via an auto-submitting HTML form POST to the SP's AssertionConsumerServiceURL.
  • Signed assertions — assertions are signed with the tenant's X.509 signing key.
  • Attribute statements — standard user attributes are mapped into SAML attributes.
  • Single Logout ServiceSingleLogoutService URL is published in metadata.
  • Custom signers — tenants can supply their own signing implementation via the SAML package.

Partial / not yet implemented

  • Inbound signature validation — SAML request signature verification is incomplete; see the TODO in the SAML package source.
  • HTTP-Redirect binding — only HTTP-POST is implemented for responses.
  • Assertion encryption — assertions are signed but not encrypted.
  • Metadata validation — metadata parsing is permissive and does not fully validate against the schema.

Released under the MIT License.