Security Assertion Markup Language (SAML) is a standard protocol used by web browsers to enable Single Sign- On (SSO) through secure tokens.
SAML eliminates the need for passwords during sign-in by implementing a secure method of passing user authentications and authorizations between the identity provider and service providers. When a user logs into a SAML enabled application, the service provider requests authorization from the appropriate identity provider. The identity provider authenticates the user’s credentials and then returns the authorization for the user to the service provider, and the user is now able to use the application.
SAML 2.0 specifies a Web Browser SSO Profile that involves exchanging information among an identity provider (IDP), a service provider (SP), and a principal (user) on a web browser. SMA100 works as a Service Provider (SP); Microsoft Azure Active Directory and one login server work as Identity Providers.
To add a domain with SAML 2.0 authorization
Prerequisite: You need to add the SMA application to an IDP that you wish to use as the SMA Authentication server. For information on adding the SMA application to an IDP and configuring SAML authentication on your SMA appliance, see Configuring SAML Authentication.
On the Domains page, click ADD DOMAIN.
Enter a descriptive name for the authentication domain in the Domain Name field.
This is the domain name users select to log in to the Secure Mobile Access user portal. It can be the same value as the Server address field.