SAML

Content Type: Module
Categories: Authentication

Overview

Use this module to implement single sign-on to your Mendix app using the SAML 2.0 protocol. This module manages the end-to-end SSO workflow when working with a SAML IDP. The IDP will relieve your app from logging in your end-users and optionally will also decide which roles the user gets assigned in your app, using mechanism from the SAML protocol.

The module is tested against AzureAD and providing a jump start to implementing providers such as Shibboleth and European eIDAS implementations such as Dutch eHerkenning and DigiD. Given adherence to commonly used parts of the SAML 2.0 specifications the module can be used to integrate your app with with IDaaS (Identity-as-a-Service) providers (e.g. Azure AD, Okta, Auth0, Ping and AWS IAM Identity Center) as well as IAM solutions such as ForgeRock and Keycloak.

Mendix also offers an “OIDC SSO”  module to authenticate your end-users using the OAuth / OpenID Connect protocol. 

Documentation

Please see SAML in the Mendix documentation for details.

 

 

 

Please follow the below version compatibility guidance:

 

# v.1.18.0 version for Mx7 apps

 

# v.2.4.3 version for Mx8 apps

 

# v.3.6.8 version for Mx9 apps using Atlas UI v2 (e.g. Mx8 apps upgraded to Mx9)

 

# v.3.6.9 version for Mx 9 and Mx 10 apps using Atlas UI v3 (e.g. for apps newly built on Mx 9 or Mx 10)

Releases

Version: 3.6.9
Framework Version: 9.24.1
Release Notes: This version contains the following fixes/improvements: -Removed static nonce and inline scripts in SAML Custom Login page(Ticket #207361) -Fixed Vulnerability - "Cleartext Transmission of Sensitive Information"(Ticket #204774) Library upgrade: -Upgraded xmlsec library to its latest version Recommendation: After upgrading to the latest version, there could be a potential issue due to conflicting Java libraries of the old and the new version. Hence it is recommended that you delete all Java libraries used by the old SAML module from the userlib folder of the project before upgrading to the latest version.
Version: 3.6.8
Framework Version: 9.24.1
Release Notes: This version contains the following fixes/improvements: -Removed static nonce and inline scripts in SAML Custom Login page(Ticket #207361) -Fixed Vulnerability - "Cleartext Transmission of Sensitive Information"(Ticket #204774) Library upgrade: -Upgraded xmlsec library to its latest version Recommendation: After upgrading to the latest version, there could be a potential issue due to conflicting Java libraries of the old and the new version. Hence it is recommended that you delete all Java libraries used by the old SAML module from the userlib folder of the project before upgrading to the latest version.
Version: 3.6.7
Framework Version: 9.24.1
Release Notes: This version contains the following fixes/improvements: - SAML decrypt encryptedAssertion Issue resolved(Ticket #199987)
Version: 3.6.6
Framework Version: 9.24.1
Release Notes: This version contains the following fixes/improvements: - SAML decrypt encryptedAssertion Issue resolved(Ticket #199987)
Version: 3.6.5
Framework Version: 9.24.1
Release Notes: This version contains the following fixes/improvements: -Improvement to index file to work with CSP headers(Ticket#184978) -Fixed NullPointer exception when login process is cancelled(Ticket#192232) Library upgrades: (Ticket#194306) - Upgraded few libraries to its latest versions - Removed un-used libraries Recommendation: After upgrading to the latest version ,there could be a potential issue due to conflicting Java libraries of the old and the new version. Hence it is recommended that you delete all Java libraries used by the old SAML module from the userlib folder of the project before upgrading to the latest version.