Configure inbound authentication¶
This section of the guide walks you through how to configure inbound authentication for your resident IdP using the following technologies:
SAML2 configurations¶
-
To configure SAML2 configurations:
-
Click SAML2 Web SSO Configuration.

-
Enter the required values and learn the fixed values as given below.
Field Description Sample/Fixed Value Identity Provider Entity ID This is for tenant identification. The users who are provisioned through this tenant can be identified using this ID. localhostDestination URLs This defines the destination URL of the identity provider. This helps the service providers that connect to MWARE IAM through a proxy server to locate MWARE IAM. https://localhost:9443/samlssoSSO URL This is the SAML SSO endpoint of the identity provider. https://localhost:9443/samlssoLogout Url This is the identity provider's endpoint that accepts SAML logout requests. https://localhost:9443/samlssoArtifact Resolution URL This is the identity provider's endpoint that resolves SAML artifacts. https://localhost:9443/samlartresolveMetadata Validity Period This is the duration for which the metadata will be valid. 60Enable metadata signing This facilitates enabling or disabling metadata signing false -
Click Update to save the configurations.
-
OAuth2/OpenID Connect configurations¶
-
To configure OAuth2 or OIDC:
-
Click OAuth2/OpenID Connect Configuration.

-
Enter the required values and learn the fixed values as given below.
Field Description Sample/Fixed Value Identity Provider Entity ID This is for tenant identification. The users who are provisioned through this tenant can be identified using this ID. localhostAuthorization Endpoint URL This is the identity provider's OAuth2/OpenID Connect authorization endpoint URL. https://localhost:9443/oauth2/authorizeToken Endpoint URL This is the identity provider's token endpoint URL. https://localhost:9443/oauth2/tokenToken Revocation Endpoint URL This is the URL of the endpoint at which access tokens and refresh tokens are revoked. https://localhost:9443/oauth2/revokeToken Introspection Endpoint URL This is the URL of the endpoint at which OAuth tokens are validated. https://localhost:9443/oauth2/introspectUser Info Endpoint URL This is the URL of the endpoint through which user information can be retrieved. The information is gathered by passing an access token. https://localhost:9443/oauth2/userinfoSession iFrame Endpoint URL This is the URL of the endpoint that provides an iframe to synchronize the session states between the client and the identity provider. https://localhost:9443/oidc/checksessionLogout Endpoint URL This is the identity provider's endpoint that accepts SAML logout requests. https://localhost:9443/oidc/logoutWeb finger Endpoint URL This is the URL of the OpenID Connect token discovery endpoint from which MWARE IAM's metadata are retrieved from. https://localhost:9443/.well-known/webfingerDiscovery Endpoint URL This is the URL of the endpoint that is used to discover the end user's OpenID provider and obtain the information required to interact with the OpenID provider, e.g., OAuth 2 endpoint locations. https://localhost:9443/oauth2/oidcdiscoveryDynamic Client Registration Endpoint URL This is the URL of the endpoint at which OpenID Connect dynamic client registration takes place. https://localhost:9443/api/identity/oauth2/dcr/v1.1/registerJWKS Endpoint URL This is the URL of the endpoint that returns MWARE IAM's public key set in JSON Web Key Set (JWKS) format. https://localhost:9443/oauth2/jwks -
Click Update to save the configurations.
-
Identity Server as a trusted IdP¶
To configure MWARE IAM as a trusted identity provider in a service provider application, you need to perform the following tasks. 1. Export the SAML2 metadata of the resident identity provider. 2. Import the metadata to the relevant service provider.
Tip
Use one of the following approaches to do this.
- Start the server and download the SAML2 metadata by accessing this URL: https://localhost:9443/identity/metadata/saml2.
- Alternatively, access the management console and follow the steps given below to download the metadata.
- Expand the Inbound Authentication Configuration > SAML2 Web SSO Configuration.
- Click Download SAML Metadata, to download the
metadata.xmlfile. -
Import the
metadata.xmlfile to the relevant service provider.