Skip to main content

SAML 2.0 API

Secure federated Single Sign-On using the Security Assertion Markup Language 2.0 standard. Enable enterprise SSO with external Identity Providers or issue SAML assertions to SP applications.

Enterprise Federation Made Easy

LumoAuth handles the complexity of SAML assertions, signatures, and bindings. Configure your SP's metadata URL and LumoAuth takes care of the rest.

Dual Mode Architecture

LumoAuth operates in two complementary SAML modes depending on your use case:

ModeLumoAuth RoleUse Case
Service Provider (SP)Consumes SAML assertions from external IdPsLet users log in via corporate IdPs (Okta, Azure AD, ADFS)
Identity Provider (IdP)Issues SAML assertions to SP applicationsEnable SSO to SAML apps (Salesforce, Box, Slack, custom apps)

SAML Endpoints Reference

Service Provider Endpoints

Use these when LumoAuth acts as the SP, accepting logins from external IdPs:

EndpointMethodDescription
/t/\{tenant\}/saml/sp/metadataGETSP Metadata XML document
/t/\{tenant\}/saml/sp/loginGETInitiate SSO (redirects to IdP)
/t/\{tenant\}/saml/sp/login/\{idpId\}GETInitiate SSO with specific IdP
/t/\{tenant\}/saml/sp/acsPOSTAssertion Consumer Service (receives SAML Response)
/t/\{tenant\}/saml/sp/sloGET/POSTSingle Logout Service

Identity Provider Endpoints

Use these when LumoAuth acts as the IdP, issuing assertions to SP applications:

EndpointMethodDescription
/t/\{tenant\}/saml/idp/metadataGETIdP Metadata XML document
/t/\{tenant\}/saml/idp/ssoGET/POSTSingle Sign-On Service (receives AuthnRequest)
/t/\{tenant\}/saml/idp/sloGET/POSTSingle Logout Service

Key Concepts

TermDescription
Entity IDUnique identifier for an SP or IdP, typically a URL
MetadataXML document describing endpoints, certificates, and capabilities
AuthnRequestSAML authentication request sent from SP to IdP
SAML ResponseSigned XML containing one or more assertions
AssertionSigned statement containing user identity and attributes
NameIDUser identifier in SAML (email, persistent ID, transient)
ACS URLAssertion Consumer Service - where responses are sent
SLOSingle Logout - terminates sessions across all parties

Security Features

FeatureDescriptionDefault
Response SigningEntire SAML Response is cryptographically signedEnabled
Assertion SigningIndividual assertions are signedEnabled
Assertion EncryptionAssertions encrypted with SP's certificateOptional
Signature VerificationVerify signatures from IdP/SPRequired
Audience RestrictionAssertions only valid for intended SPEnforced
Replay ProtectionAssertions cannot be reusedEnforced

Getting Started

Quick Setup Path

For the fastest setup, use metadata URL exchange. Provide your SP's metadata URL to LumoAuth, and LumoAuth's metadata URL to your SP.

For Service Provider Mode

→ Service Provider Configuration Guide

For Identity Provider Mode

→ Identity Provider Configuration Guide

Metadata Reference

→ SAML Metadata Documentation

Supported NameID Formats

FormatURNTypical Use
Email Addressurn:oasis:names:tc:SAML:1.1:nameid-format:emailAddressMost common, matches on email
Persistenturn:oasis:names:tc:SAML:2.0:nameid-format:persistentStable identifier, survives email changes
Transienturn:oasis:names:tc:SAML:2.0:nameid-format:transientSession-specific, privacy-focused
Unspecifiedurn:oasis:names:tc:SAML:1.1:nameid-format:unspecifiedSP determines interpretation

Glossary

TermDefinition
SAMLSecurity Assertion Markup Language - XML-based SSO standard
SSOSingle Sign-On - one login for multiple applications
IdPIdentity Provider - authenticates users and issues assertions
SPService Provider - application that accepts SAML assertions
JIT ProvisioningJust-in-Time user creation on first SAML login
X.509Standard for digital certificates used in SAML signing

Reference Specifications