Application Manager

Once you have at least one data store added on the New Experience, click Add an Application to integrate an app with SecureAuth IdP.

Make a selection from the application template library to start creating your app. The generic SAML Application template is used in this example.

NOTE: Prior to SecureAuth IdP version 9.3, the Web Admin was organized by realms you created. These realms contained applications you integrated with SecureAuth IdP, and included the configuration made on the following Web Admin tabs: Overview, Data, Workflow, Adaptive Authentication, Multi-Factor Methods, Post Authentication, API, Logs, and System Info.

In the New Experience, you configure equivalent portions of the Overview and Post Authentication tabs when adding an application to your Application Manager library.


Application Details

Identify this application

Create the Application Name to be used to access the application in the Application Manager list – "Initech" in this example.

Provide the Application Description – "Initech SAML Application" in this example.

Upload a logo.

Identify which data stores and user groups can access this application

Begin typing the Data Store name, and then select the data store when it appears in the list.

Repeat this step to add all Data Stores to be associated with this application.

Enter the name of each group to be given access to this application, or toggle the switch to enable access to all Groups.

Look and Feel section

  • Document Title – Enter the Application Name.

  • Page Header – This information is only entered on the Classic Experience and appears above the company logo on the login page.


Details section

  • Realm Description – Enter the Application Description.

  • Company Logo – Upload a logo to be used in the Application Manager and on the login page.



Connection Settings

Configure Connection

Select the Connection Type to specify how the service provider will send the authentication request to SecureAuth IdP – SP Initiated or IdP Initiated.

For SP Initiated, if required, specify if the connection should be made "By Redirect" (sending the authentication request with the related signature), or "By Post" (sending the authentication request with the signature embedded).

Post Authentication section


  • Authenticated User Redirect – Connection Type selections include options for Redirect and Post.

The selection made in this field auto-populates the Redirect To field below.

NOTE: This configuration can't be modified in the Classic Experience.

User ID Mapping

Select the User ID Profile Field that is mapped to the data store property containing the end-user's identification from the application.

Select the Name ID Format to use in the assertion when submitting the end-user's identity profile.

User ID Mapping section


  • User ID Mapping – Select the User ID Profile Field from the dropdown.
  • Name ID Format – Select the name identifier format supported by SecureAuth IdP and the application.

Upload Metadata file (optional)

If you have a pre-configured metadata file, you can upload it by clicking Upload Metadata at the bottom right of the page.

The uploaded metadata file pre-populates fields on this page so you don't have to make individual entries. This functionality is new in SecureAuth IdP version 9.3 when using the generic SAML Application template.

SAML Assertion

Set a unique name for the IdP Issuer – this will be shared with the service provider.

Make the following entries, if required:

Set the Hours and Minutes for which the Assertion will be valid – this should be at least one hour.

Configure the Offset Minutes to accommodate time differences between devices being used.

Enable these functions if required:

SAML Assertion / WS Federation section


  • Equivalent fields in Classic and New Experience user interfaces

    Classic ExperienceNew Experience
    WSFed Reply To / SAML Target URLRelay State
    SAML Consumer URLAssertion Consumer Service (ACS)
    WSFed / SAML IssuerIdP Issuer
    SAML RecipientRecipient
    SAML AudienceAudience
    SP Start URLSP Login URL
    SAML Signing AlgorithmSigning Algorithm
    SAML Offset MinutesOffset Minutes
    SAML Valid HoursHours, Minutes
    Sign SAML Assertion – True / FalseSign SAML Assertion toggle switch
    Sign SAML Message True / FalseSign SAML Message toggle switch
    Encrypt SAML Assertion True / FalseEncrypt SAML Assertion toggle switch
    SAML Data Encryption MethodData Encryption Method dropdown accessible if Encrypt SAML Assertion is enabled
    SAML Key Encryption MethodKey Encryption Method dropdown accessible if Encrypt SAML Assertion is enabled
    Signing Cert Serial Number Select Certificate linkIdP Signing Certificate Serial Number accessible if Sign SAML Assertion / Sign SAML Message is enabled
    Assertion Signing Certificate certificate download linkIdP Signing Certificate Select Certificate link accessible if Sign SAML Assertion / Sign SAML Message is enabled

SAML Attributes

If additional information from the directory is required in the SAML assertion, click Add SAML Attribute and configure settings for:

SAML Attributes / WS Federation section


  • Name – Set the Attribute Name to include in the SAML assertion.
  • Namespace (1.1) – Enter the Namespace (1.1) URL to include in the SAML assertion.
  • Value – Select the Data Store Property corresponding to the specified Attribute Name.


Save the configured application

Click Add Application to save the configuration.

In the Classic Experience, you click Save on each tab you configure on the Web Admin.


Information for Service Providers

You can copy and paste this information in the service provider user interface:

If you specified an IdP Signing Certificate, you can click the link to Download it.

Download Metadata File

Click Download Metadata at the bottom right of the Information for Service Providers page.

Enter the Domain name in the popup window and click Download.

SAML Assertion / WS Federation section

Information for Service Providers / Download Metadata File

  • WSFed / SAML Issuer – IdP Issuer can be copied from this field.
  • Metadata File – Download link is located at the bottom of the SAML Assertion / WS Federation section.


Continue to Summary

Click Continue to Summary at the bottom left of the Information for Service Providers page.

You can make edits to your configuration by clicking the pencil icon to the far right in each section of the Summary page.

NOTE: The link to the login page you created for the application appears beneath the Application Description ("Initech SAML Application" in this example). This link includes the realm number for the application. Use this link to test the application.


Complete the application on the Classic Experience...

To modify the default Workflow, Two-Factor Authentication method, and Adaptive Authentication modules enabled for this application, go to the Classic Experience.