You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
There are a number of ways to mess up certificate formats. For example, #230.
It would welcome if there was a better support for validating the configuration--especially the certificates.
For example, as part of constructing a new SAML object, the certificates could be immediately validated for syntax.
It's common to work with SAML partners that don't provide test logins on their servers. So if a cert isn't tested until an actual SAML response is set, this may involve contacting someone at another organization to have them test logging in.
It would be helpful to validate the configuration as much as possible up front automatically to avoid anymore back in forth during SAML integrations.
The text was updated successfully, but these errors were encountered:
Don't know if it's useful, but I was using http://samltool.com in order to test everything and was able to successfully finish the integration thanks to it.
There are a number of ways to mess up certificate formats. For example, #230.
It would welcome if there was a better support for validating the configuration--especially the certificates.
For example, as part of constructing a new SAML object, the certificates could be immediately validated for syntax.
It's common to work with SAML partners that don't provide test logins on their servers. So if a cert isn't tested until an actual SAML response is set, this may involve contacting someone at another organization to have them test logging in.
It would be helpful to validate the configuration as much as possible up front automatically to avoid anymore back in forth during SAML integrations.
The text was updated successfully, but these errors were encountered: