Skip to content

Generic SAML Enterprise Connection

Use Generic SAML when your identity provider supports SAML 2.0 but is not listed as a named provider in AuthAction.

Use these values when registering AuthAction as a relying party in your IdP:

FieldValue
ACS URLhttps://<tenant-name>.<region>.authaction.com/oauth2/saml/callback
SP Entity IDYour tenant URL (for example https://<tenant-name>.<region>.authaction.com)
Name ID formaturn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress

Replace <tenant-name> and <region> with your AuthAction tenant values.

Step 1: Create a SAML application in your IdP

Section titled “Step 1: Create a SAML application in your IdP”
  1. Create a new SAML application or relying party for AuthAction.
  2. Set the ACS / Reply URL to the ACS URL above.
  3. Set the Audience / SP Entity ID to your tenant URL.
  4. Configure Name ID to map to the user’s email address when possible.
Field in AuthActionDescription
IdP SSO URLThe HTTP-Redirect (or equivalent) SSO endpoint of your IdP
Entity ID / IssuerUnique identifier your IdP publishes for itself
Certificate(Optional) IdP X.509 certificate for SAML assertion signature verification
  1. Open the AuthAction Dashboard.
  2. Go to Connections > Enterprise Connections.
  3. Select Generic SAML (or equivalent).
  4. Enter the IdP SSO URL, Entity ID / Issuer, and optional Certificate.
  5. Save the connection.
  1. Under Applications, enable this enterprise connection for the apps that should use it.
  2. Open your app login page and complete an enterprise sign-in to verify the flow.