Configuring SAML Protocol
Hideez Enterprise Server – SAML Protocol
Last updated
Was this helpful?
Hideez Enterprise Server – SAML Protocol
Last updated
Was this helpful?
With Hideez Server’s support for FIDO2 passwordless authorization, service providers gain the ability to authenticate users through:
Hardware security keys (e.g., Hideez Key, YubiKey, etc.)
Passkeys (e.g., smartphones, laptops)
Hideez Authenticator App
Username + password (not recommended)
Username + password + (security key: or , , )
Passwordless
Username + Security key ( or )
Passwordless, User nameless (without typing login and password)
Security key ( or )
In the Hideez Server dashboard, navigate to Parameters → Settings → SAML.
The .pfx certificate contains both the public certificate and private key. You can:
Download an existing certificate: Select the certificate, enter the password, and download.
Create a new self-signed certificate: Click Create and Download, enter the password, and download.
Identity Provider Public Certificate (.cer): Contains only the public key and is used for server authentication and data encryption.
Identity Provider Metadata: Provides essential IdP details required for interaction with SPs.
Here’s an example for Google Workspace:
Navigate to Menu → Security → Authentication → SSO with third-party IdP.
Under Third-party SSO profiles, click Add SAML profile.
Enter a profile name (e.g., "Hideez Server (IdP)").
Paste values from Hideez Server:
Issuer / IdP Entity ID (e.g., https:// <your hideez server name>
) (1)
Login URL (e.g., https:// <your hideez server name>/saml/login
) (2)
Logout URL (e.g., https:// <your hideez server name>/saml/logout
) (3)
Upload the Identity Provider public certificate (.cer) file (4).
In Hideez Server, click Add Service Provider and enter the SP values:
Name (e.g., Google Workspace-SAML
)
Issuer / SP Entity ID (e.g., https://accounts.google.com/samlrp/unique-id
) (1)
ACS URL (e.g., https://accounts.google.com/samlrp/unique-id/acs)
(2)
Click Add
Single Logout Service: SP endpoint for terminating sessions during logout. Obtain this URL from the SP settings.
Name ID Format: Set based on SP requirements (Email, x509, etc.).
Enable Request Signature Validation: Adds security by validating incoming SAML requests.
Assertion Attributes: Configure attribute mappings to transfer necessary user details to the SP.
Go to .
While the list provided is not exhaustive, each web service may have its own specific configuration. If you require assistance in integrating your web app with Hideez Server using SAML, don't hesitate to . We're here to help.