(window.webpackJsonp=window.webpackJsonp||[]).push([[298],{723:function(t,e,r){"use strict";r.r(e);var n=r(56),s=Object(n.a)({},(function(){var t=this,e=t.$createElement,r=t._self._c||e;return r("ContentSlotsDistributor",{attrs:{"slot-key":t.$parent.slotKey}},[r("h1",{attrs:{id:"saml-2-0-login"}},[r("a",{staticClass:"header-anchor",attrs:{href:"#saml-2-0-login"}},[t._v("#")]),t._v(" SAML 2.0 Login")]),t._v(" "),r("p",[t._v("The SAML 2.0 Login feature provides an application with the capability to act as a SAML 2.0 Relying Party, having users "),r("a",{attrs:{href:"https://wiki.shibboleth.net/confluence/display/CONCEPT/FlowsAndConfig",target:"_blank",rel:"noopener noreferrer"}},[t._v("log in"),r("OutboundLink")],1),t._v(" to the application by using their existing account at a SAML 2.0 Asserting Party (Okta, ADFS, etc).")]),t._v(" "),r("table",[r("thead",[r("tr",[r("th"),t._v(" "),r("th",[t._v("SAML 2.0 Login is implemented by using the "),r("strong",[t._v("Web Browser SSO Profile")]),t._v(", as specified in"),r("a",{attrs:{href:"https://www.oasis-open.org/committees/download.php/35389/sstc-saml-profiles-errata-2.0-wd-06-diff.pdf#page=15",target:"_blank",rel:"noopener noreferrer"}},[t._v("SAML 2 Profiles"),r("OutboundLink")],1),t._v(".")])])]),t._v(" "),r("tbody")]),t._v(" "),r("p",[t._v("Since 2009, support for relying parties has existed as an "),r("a",{attrs:{href:"https://github.com/spring-projects/spring-security-saml/tree/1e013b07a7772defd6a26fcfae187c9bf661ee8f#spring-saml",target:"_blank",rel:"noopener noreferrer"}},[t._v("extension project"),r("OutboundLink")],1),t._v(".\nIn 2019, the process began to port that into "),r("a",{attrs:{href:"https://github.com/spring-projects/spring-security",target:"_blank",rel:"noopener noreferrer"}},[t._v("Spring Security"),r("OutboundLink")],1),t._v(" proper.\nThis process is similar to the one started in 2017 for "),r("RouterLink",{attrs:{to:"/oauth2/index.html"}},[t._v("Spring Security’s OAuth 2.0 support")]),t._v(".")],1),t._v(" "),r("table",[r("thead",[r("tr",[r("th"),t._v(" "),r("th",[t._v("A working sample for "),r("a",{attrs:{href:"https://github.com/spring-projects/spring-security-samples/tree/5.6.x/servlet/spring-boot/java/saml2/login",target:"_blank",rel:"noopener noreferrer"}},[t._v("SAML 2.0 Login"),r("OutboundLink")],1),t._v(" is available in the "),r("a",{attrs:{href:"https://github.com/spring-projects/spring-security-samples/tree/5.6.x",target:"_blank",rel:"noopener noreferrer"}},[t._v("Spring Security Samples repository"),r("OutboundLink")],1),t._v(".")])])]),t._v(" "),r("tbody")]),t._v(" "),r("h2",{attrs:{id:"section-summary"}},[r("a",{staticClass:"header-anchor",attrs:{href:"#section-summary"}},[t._v("#")]),t._v(" Section Summary")]),t._v(" "),r("ul",[r("li",[r("RouterLink",{attrs:{to:"/en/spring-security/overview.html"}},[t._v("SAML2 Log In Overview")])],1),t._v(" "),r("li",[r("RouterLink",{attrs:{to:"/en/spring-security/authentication-requests.html"}},[t._v("SAML2 Authentication Requests")])],1),t._v(" "),r("li",[r("RouterLink",{attrs:{to:"/en/spring-security/authentication.html"}},[t._v("SAML2 Authentication Responses")])],1)]),t._v(" "),r("p",[r("RouterLink",{attrs:{to:"/en/index.html"}},[t._v("SAML2")]),r("RouterLink",{attrs:{to:"/en/spring-security/overview.html"}},[t._v("SAML2 Log In Overview")])],1)])}),[],!1,null,null,null);e.default=s.exports}}]);