$ gadmin config entry Security.SSO.SAML
Security.SSO.SAML.Enable [ false ]: Enable SAML2-based SSO: default false
Security.SSO.SAML.AuthnRequestSigned [ true ]: Sign AuthnRequests before sending to Identity Provider: default true
Security.SSO.SAML.AssertionSigned [ true ]: Require Identity Provider to sign assertions: default true
Security.SSO.SAML.ResponseSigned [ true ]: Require Identity Provider to sign SAML responses: default true
Security.SSO.SAML.MetadataSigned [ true ]: Sign Metadata: default true
Security.SSO.SAML.SignatureAlgorithm [ rsa-sha256 ]: Signiture algorithm [rsa-sha1/rsa-sha256/rsa-sha384/rsa-sha512]: default rsa-sha256
Security.SSO.SAML.BuiltinUser [ __GSQL__saml ]: The builtin user for SAML
Security.SSO.SAML.RequestedAuthnContext [ ]: Authentication context (comma separate multiple values)
New: urn:oasis:names:tc:SAML:2.0:ac:classes:Password
Security.SSO.SAML.SP.Hostname [ http://127.0.0.1:14240 ]: TigerGraph Service Provider URL: default http://127.0.0.1:14240
New: http://localhost:14240
Security.SSO.SAML.SP.X509Cert [ ]: Content of the x509 Certificate: default empty. You can use @/cert/file/path to pass the certificate from a file.
Security.SSO.SAML.SP.PrivateKey [ ]: Content of the host machine's private key. Require PKCS#8 format (start with "BEGIN PRIVATE KEY"). You can use @/privatekey/file/path to pass the certificate from a file.
Security.SSO.SAML.IDP.EntityId [ http://idp.example.com ]: Identity Provider Entity ID: default http://idp.example.com
New: http://idp.example.com
Security.SSO.SAML.IDP.SSOUrl [ http://idp.example.com/sso/saml ]: Single Sign-On URL: default http://idp.example.com/sso/saml
New: http://idp.example.com/sso/saml
Security.SSO.SAML.IDP.X509Cert [ ]: Identity Provider's x509 Certificate filepath: default empty
New: /home/tigergraph/idp.cert