Third Party SSO

Created by
Last updated 7 November 2022, 09:43

Watch for changes

✓ Subscribed

25Our Single Sign-On (SSO) uses the SAML 2.0 standard for exchanging authentication and authorisation between Service Providers (SPs) and Identity Providers (IdPs).

SAML stands for Security Assertion Markup Language. It is an XML-based open standard used to exchange authentication and authorisation data between security domains, in particular, between an Identity Provider (IdP) and a Service Provider (SP).

The standard SAML SSO flow is as follows.

 

Third Party libraries

There are a number of available third party libraries to make it easier to integrate SSO into your current application. You must make sure that the chosen library supports sha256 for signing.

We recommend the phpsaml for php applications and OneloginSamlBundle for Symfony applications.

For Java application we recommend https://spring.io/projects/spring-security-saml.

For .Net we recommend Saml2

Private key and certificate

You can generate a key pair with OpenSSL.

openssl req -new -x509 -days 365 -nodes -sha256 -out saml.crt -keyout saml.pem

SAML Metadata

The standard defines a metadata document which describes a SAML deployment (including relevant endpoints and X.509 certificate). This will be available at <SAML URL>/saml/metadata. A entity ID will also need to be chosen, we recommend that it should be the URL of the metadata for example https://www.example.com/metadata. During a certificate rollover the metadata will contain two KeyDescriptors. The order of the KeyDescriptors is not guaranteed. The new key should be used immediately but the old key will still work for 14 days. After 14 days the old key will no longer work and the metadata will only display the new key. Ideally the metadata endpoint should be queried daily to ensure keys are always up-to-date.

Sport:80 Metadata

It is important to know that the testing sandbox environments on the subdomains of the test servers have different Metadata to the LIVE production environment.

  1. TEST - https://dev-auth.s80testing.co.uk/saml/metadata

  2. LIVE - https://auth.sport80.com/saml/metadata

Example of Idp XML metadata

<?xml version="1.0"?>
<EntityDescriptor xmlns="urn:oasis:names:tc:SAML:2.0:metadata" entityID="https://sso.sport80.com/saml/metadata" ID="_5cdb44cc66cd321b45a665f64cf07f5e750f621a00">
  <IDPSSODescriptor protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol" WantAuthnRequestsSigned="true">
    <KeyDescriptor use="signing">
      <ds:KeyInfo xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
        <ds:X509Data>
          <ds:X509Certificate>
            <-- X509 Certificate -->
          </ds:X509Certificate>
        </ds:X509Data>
      </ds:KeyInfo>
    </KeyDescriptor>
    <SingleLogoutService Location="http://auth.services.localhost/saml/logout"/>
    <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress</NameIDFormat>
    <SingleSignOnService Location="http://auth.services.localhost/saml/login"/>
  </IDPSSODescriptor>
</EntityDescriptor>

Example of Idp XML metadata during certificate rollover

<?xml version="1.0"?>
<EntityDescriptor xmlns="urn:oasis:names:tc:SAML:2.0:metadata" entityID="https://sso.sport80.com/saml/metadata" ID="_5cdb44cc66cd321b45a665f64cf07f5e750f621a00">
  <IDPSSODescriptor protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol" WantAuthnRequestsSigned="true">
    <KeyDescriptor use="signing">
      <ds:KeyInfo xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
        <ds:X509Data>
          <ds:X509Certificate>
            <-- X509 Certificate -->
          </ds:X509Certificate>
        </ds:X509Data>
      </ds:KeyInfo>
    </KeyDescriptor>
    <KeyDescriptor use="signing">
      <ds:KeyInfo xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
        <ds:X509Data>
          <ds:X509Certificate>
            <-- X509 Certificate -->
          </ds:X509Certificate>
        </ds:X509Data>
      </ds:KeyInfo>
    </KeyDescriptor>
    <SingleLogoutService Location="http://auth.services.localhost/saml/logout"/>
    <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress</NameIDFormat>
    <SingleSignOnService Location="http://auth.services.localhost/saml/login"/>
  </IDPSSODescriptor>
</EntityDescriptor>

Example of SP XML metadata

<?xml version="1.0"?>
<md:EntityDescriptor xmlns:md="urn:oasis:names:tc:SAML:2.0:metadata" validUntil="2020-06-20T10:12:06Z" cacheDuration="PT604800S" entityID="https://ecm.sport80.com">
  <md:SPSSODescriptor AuthnRequestsSigned="true" WantAssertionsSigned="true" protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol">
    <md:KeyDescriptor use="signing">
      <ds:KeyInfo xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
        <ds:X509Data>
          <ds:X509Certificate>
            <-- X509 Certificate -->
          </ds:X509Certificate>
        </ds:X509Data>
      </ds:KeyInfo>
    </md:KeyDescriptor>
    <md:SingleLogoutService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect" Location="https://ecm.sport80.com/saml/logout"/>
    <md:NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress</md:NameIDFormat>
    <md:AssertionConsumerService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Location="https://ecm.sport80.com/saml/acs" index="1"/>
  </md:SPSSODescriptor>
  <md:Organization>
    <md:OrganizationName xml:lang="en">Example</md:OrganizationName>
    <md:OrganizationDisplayName xml:lang="en">Example</md:OrganizationDisplayName>
    <md:OrganizationURL xml:lang="en">http://example.com</md:OrganizationURL>
  </md:Organization>
  <md:ContactPerson contactType="technical">
    <md:GivenName>Tech User</md:GivenName>
    <md:EmailAddress>techuser@example.com</md:EmailAddress>
  </md:ContactPerson>
  <md:ContactPerson contactType="support">
    <md:GivenName>Support User</md:GivenName>
    <md:EmailAddress>supportuser@example.com</md:EmailAddress>
  </md:ContactPerson>
</md:EntityDescriptor>

AuthnRequest

To initiate login a AuthnRequest should be be sent to SingleSignOnService location detailed in the metadata. AuthnRequests should use the urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect binding. The request should contain a SAMLRequest parameter which is a deflated and base64 encoded XML authnRequest. All authnRequests should be singed. A Signature Parameter should contain the signature for the SAMLRequest. A SigAlg parameter should indicate which algorithm the signature uses. An optional RelayState parameter can be also included and will be returned with the response from the authnRquest.

Example AuthNRequest

<?xml version="1.0"?>
<AuthnRequest xmlns="urn:oasis:names:tc:SAML:2.0:protocol" ID="ONELOGIN_e6d35fd8e34cc782f5bde726be36ef8082018050" Version="2.0" IssueInstant="2020-06-18T09:28:46Z" Destination="http://auth.services.localhost/saml/login" ProtocolBinding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" AssertionConsumerServiceURL="http://localhost:9000/saml/acs" ProviderName="Example">
  <saml:Issuer xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion">https://ecm.sport80.com</saml:Issuer>
  <NameIDPolicy Format="urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress" AllowCreate="false"/>
</AuthnRequest>

Example complete authnRequest url

http://auth.services.localhost/saml/login?SAMLRequest=fVJLbxoxEL7zK6K9s%2BvNsgQsQNoGkiJRQIHkkEvk2gNY8mPr8dLk39e7bmkbKZmbx%2FM95rMnyLSqadX4k3mAHw2g712FetXKIO0up0njDLUMJVLDNCD1nO6qbyt6nRJaO%2Bsttyp5B%2FscxRDBeWlNhC3n02SzXqw298v1SymGQ7gpB4JDMRhBUY4FE2I0IPmoAH5gYwKHUvBBhD6Bw8AzTQJt7GydPUsBbh1Up8nilelawW8dxAaWBj0zPiDINemTYT%2B%2F2eclJQUtyHOcm4cYpGG%2BIz55X9MsYyGiNLg%2BSw6YKsuZOln0WbtspuxRmot8F8gXaYQ0x89z%2BB6HkH7d77f97Wa3jyTVn3xurcFGg9tF4ceH1cXQxQIdE0KiD8YxmXUMk%2FZMu4XdrEVggADXKdbW%2BRFJudWT7N%2Bhv7Cattkt51urJH%2Fr%2Bm3dWaeZ%2F3ihPM27jhT9QzdKQTOpKiEcICYXnkop%2B%2FPWAfPhfbxrILnKZr1o5v%2BvOPsF&RelayState=http%3A%2F%2Flocalhost%3A9000%2F&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%23rsa-sha512&Signature=JNQPIh2edUkHgy5HHO61VRWptNuIJC%2FKVhDXQDDccdVYuetKzent1cJVrAwQrVV4ZPymyNleRglNcbJjB7ldTf%2BbW6RlO6LRy35LUbo%2ByO4t32K83SS9r9U03%2Bp%2FCz9%2BKy6bYeDfhRyigjd4ACKcGx2ZfcyAXpA4WLisZ1%2FNboJ1soTCyTRJEIwUV5fB9cp2cNSa56P0R%2BQDlgHLr7pRrd%2BqQBqqr0nsFJhW4E9raw2szOl1venLHuXl8kejef0ZukIhTYgSriKeMOayRDHsjC1rksSrku5ahu%2BzAA9vhOS9IYeRj0iFXMj2Y8Rzv9VQcR%2FHNAuwZCS5e70TCm2xiA%3D%3D

AuthnRequest Response

Once the user has been successfully authenticated a signed SAML Response with a signed Assertion will be sent back to the AssertionConsumerServiceURL which should use the urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST binding. The SAMLResponsewill be deflated and base64 encoded. The response will contain the users email as a attribute with a FriendlyName of email. It will also contain a UUID attribute what a FriendlyName of uuid. The UUID can then be used to query the API for user details. If request we can include a user API token that will allow you to query our API. This token is linked to the users session so upon logout the token will no longer be valid. You can access this token attribute with the FriendlyName of userApiToken

Example XML Response

<?xml version="1.0"?>
<samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" ID="_71b297f9e50fe39acea10853c1fc86f4653eefccc1" Version="2.0" IssueInstant="2020-06-18T14:31:30Z" Destination="https://ecm.sport80.com/saml/acs">
  <saml:Issuer xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion">https://sso.sport80.com</saml:Issuer>
  <ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
    <ds:SignedInfo>
      <ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
      <ds:SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha512"/>
      <ds:Reference URI="#_71b297f9e50fe39acea10853c1fc86f4653eefccc1">
        <ds:Transforms>
          <ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/>
          <ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
        </ds:Transforms>
        <ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha512"/>
        <ds:DigestValue>gRjkS5eXvRUru7RPw4y3JGyIQJobakLg2lPyD6eLwzk=</ds:DigestValue>
      </ds:Reference>
    </ds:SignedInfo>
    <ds:SignatureValue>Al3KsupbEpKvZeAmnynOZTv2Nx49tUk5FH6Q6o6gCuMPmPQ73G0JVueNdgVSVt6h/B9VPY9qQNvjTArhLrhx3WV3vxgftkbwfRLLjPgO8vTrcSO2XPFTWrBm0tVdu1nzGbgi5ccm2sKZJAaL0268Tzt/oeHp4KysCXFVTpDqHv2L7BcLg1j4aghUAr/MmePmklK5lK6sEVJOquoDMfKgyzVFmTGZJW1v65+jPOZgLUfqUmkKptaOb0+/UBqqSEDV7MO6kR6xYef5IFiTwAmv8B78YNah02H3cfyDxqhhDQhPAErJgDEs7CtGlSFU7hqr6vID7yt6OmK1aE4dphF5Uw==</ds:SignatureValue>
    <ds:KeyInfo>
      <ds:X509Data>
        <ds:X509Certificate><-- X509 Certificate --></ds:X509Certificate>
      </ds:X509Data>
    </ds:KeyInfo>
  </ds:Signature>
  <samlp:Status>
    <samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/>
  </samlp:Status>
  <Assertion xmlns="urn:oasis:names:tc:SAML:2.0:assertion" ID="_db62dfa76e6ff9a2e41567e6fd63d6442221bd4090" Version="2.0" IssueInstant="2020-06-18T14:31:30Z">
    <Issuer>https://sso.sport80.com</Issuer>
    <ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
      <ds:SignedInfo>
        <ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
        <ds:SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha512"/>
        <ds:Reference URI="#_db62dfa76e6ff9a2e41567e6fd63d6442221bd4090">
          <ds:Transforms>
            <ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/>
            <ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
          </ds:Transforms>
          <ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha512"/>
          <ds:DigestValue>sVBGLobI0P93nvqwyp5yY+v8G84inFDLac4DB+cGYrs=</ds:DigestValue>
        </ds:Reference>
      </ds:SignedInfo>
      <ds:SignatureValue>T1e++iIrVmy3l/NbS9dg+2knVOQTBJcPVwjZFdCdqlWoLRtlvaJkzESgBxfyqU2yx5JiCe/7NDNR1LvAmZ8ranru6TH062/nsLb/6uboZWn0rkr0uJXNp1PLtmG7G5RHSijFPSnPXhksmscEyvWC1alj+1JSPCgMMFklWTLHOXBWSi3D7QhahwvLynk6Wk23ksVzqmNsEK1DYd9EoSaIP9eabhGa+6zku+Rc+APE9mf2+/F7U/fsOVVQOXa5Ra3sRmQcaPjpMuw1JyaC2NBLVX5keqcRgSvsY3fCwyZaGVVa67hJXYfqpwLiPaWzHOWJg+4UPl2VvT1HxDEkzjw/Rw==</ds:SignatureValue>
      <ds:KeyInfo>
        <ds:X509Data>
          <ds:X509Certificate><-- X509 Certificate --></ds:X509Certificate>
        </ds:X509Data>
      </ds:KeyInfo>
    </ds:Signature>
    <Subject>
      <NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress">test@example.com</NameID>
      <SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer">
      <SubjectConfirmationData InResponseTo="ONELOGIN_c53fbd4387389621d8d55f51cc6bd9fc019281b5" NotOnOrAfter="2020-06-18T14:32:30Z" Recipient="https://ecm.sport80.com/saml/acs"/></SubjectConfirmation>
    </Subject>
    <Conditions NotBefore="2020-06-18T14:31:30Z" NotOnOrAfter="2020-06-18T14:31:30Z">
      <AudienceRestriction>
        <Audience>https://ecm.sport80.com</Audience>
      </AudienceRestriction>
    </Conditions>
    <AttributeStatement>
      <Attribute Name="email" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic" FriendlyName="email">
        <AttributeValue>test@example.com</AttributeValue>
      </Attribute>
      <Attribute Name="uuid" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic" FriendlyName="uuid">
        <AttributeValue>b11b4f62-f199-4c1b-b065-ba2be3f2b212</AttributeValue>
      </Attribute>
    </AttributeStatement>
    <AuthnStatement AuthnInstant="2020-06-18T14:21:30Z" SessionIndex="k4i3jh9rfloaciidacaa3vc41n">
      <AuthnContext>
        <AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</AuthnContextClassRef>
      </AuthnContext>
    </AuthnStatement>
  </Assertion>
</samlp:Response>

Example response post body

SAMLResponse:"<?xml version="1.0"?>
<samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" ID="_7597841d8237e0631a0f543f7d0634369149d611df" Version="2.0" IssueInstant="2020-06-18T13:08:32Z" Destination="http://localhost:9000/saml/acs"><saml:Issuer xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion">https://sso.sport80.com</saml:Issuer><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
  <ds:SignedInfo><ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
    <ds:SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/>
  <ds:Reference URI="#_7597841d8237e0631a0f543f7d0634369149d611df"><ds:Transforms><ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></ds:Transforms><ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/><ds:DigestValue>Lfu5K6abCeGTL3QnHtw42l/ISMJrXwYzrylNdaiLIuo=</ds:DigestValue></ds:Reference></ds:SignedInfo><ds:SignatureValue>M75lnzTcvID5EJCGYs25NjRySPdcBlAKipXt7Ecq6ns31vJNUoWGCJLlyJG3YgcwMz/vD1hfIM0WyhwZVL8AoEIvnZEUE4kzWv8Nq5VGoDD0H2hQhcyyRmgUnpF4/3W6Mo70OL9JWUAyEVz7421VNHNm2sAeLRvjb6kMd+7biR+fFutBBmVVOzSR1m0LvUCk8Db3i8nPzOFxAin3uPWj97kDxlLyRb4zmG6Yn0gmV8rVb3S9dqC8+/uQX3OP15s+PNNzMbBvsSQhh7CtWKAgufingwXP1iYV8agWkaUmC1jHmewD+FbBiHtz0D93o/ik9Mkr6Yv9/2r/YLcTNKLrnw==</ds:SignatureValue>
<ds:KeyInfo><ds:X509Data><ds:X509Certificate>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</ds:X509Certificate></ds:X509Data></ds:KeyInfo></ds:Signature><samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status><Assertion xmlns="urn:oasis:names:tc:SAML:2.0:assertion" ID="_62e42cfe94146cb65ce6da83f938b73e1d72736a70" Version="2.0" IssueInstant="2020-06-18T13:08:32Z"><Issuer>https://sso.sport80.com</Issuer><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
  <ds:SignedInfo><ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
    <ds:SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/>
  <ds:Reference URI="#_62e42cfe94146cb65ce6da83f938b73e1d72736a70"><ds:Transforms><ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></ds:Transforms><ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/><ds:DigestValue>6bQ5T1sTAwaV8cg3XTQwhDtatF+uEsSX0enF/BbN+W8=</ds:DigestValue></ds:Reference></ds:SignedInfo><ds:SignatureValue>tUDdF7g1G6nqm5YfYbbi9Xl1gMQSVMuOJExZsYP8vkV8qQT+8uMWghdTGpEXvHlxDgqWdUUDgtf2Kmd4z+ENSsNczC6nzSt9ltz3/SfLlB9nOBufL06R6nbWZj8W57AkObrqhbJncjbLCj+qR6SxaZXZvcgG6Qkbm+OD+9ymyv4ysD6k6kkzjg6WtY1Ucap/qhHmdtQ5qJPVbRy/C1aS5UHQWgvKEKwhiXoBH4616tLQJ2Gq6HFQ4FFcaP+0inDpGDxN0HW08VPWza+3XX9qGDKB+dXrohCUh88jwrkyfhD8NR7TeHEE9xln/uzSzsJf+t88ys6bAH26emqM0IVN2Q==</ds:SignatureValue>
<ds:KeyInfo><ds:X509Data><ds:X509Certificate>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</ds:X509Certificate></ds:X509Data></ds:KeyInfo></ds:Signature><Subject><NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress">chris.johnston@sport80.com</NameID><SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"><SubjectConfirmationData InResponseTo="ONELOGIN_c7fc7b9076e9cb47724e34281647d91857bf4420" NotOnOrAfter="2020-06-18T13:09:32Z" Recipient="http://localhost:9000/saml/acs"/></SubjectConfirmation></Subject><Conditions NotBefore="2020-06-18T13:08:32Z" NotOnOrAfter="2020-06-18T13:08:32Z"><AudienceRestriction><Audience>https://ecm.sport80.com</Audience></AudienceRestriction></Conditions><AttributeStatement><Attribute Name="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress" FriendlyName="email"><AttributeValue>chris.johnston@sport80.com</AttributeValue></Attribute><Attribute Name="http://schemas.xmlsoap.org/ws/2005/05/identity/claims/privatepersonalidentifier" FriendlyName="ppid"><AttributeValue>5eeb675010494</AttributeValue></Attribute></AttributeStatement><AuthnStatement AuthnInstant="2020-06-18T12:58:32Z" SessionIndex="h97h1pmpkkqb632llvnt6fhm8e"><AuthnContext><AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</AuthnContextClassRef></AuthnContext></AuthnStatement></Assertion></samlp:Response>
"
RelayState:"http://ecm.sport80.com/dashboard"

Single Logout (SLO)

Your SLO endpoint needs to be able to send a SAML Logout Request to our SLO endpoint. This will then log the user out of all active SSO sessions. All SLO requests need to be singed.

Your SLO endpoint needs to be able to handle SAML Logout Requests. This is to ensure that when a user is logged out they are logged out of all systems. You should terminate the users session before sending the SLO request.

All SLO Requests should be sent to the SingleLogoutService location details in the metadata. It should use the urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect binding.

Example XML Logout Request

<samlp:LogoutRequest xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" ID="ONELOGIN_21df91a89767879fc0f7df6a1490c6000c81644d" Version="2.0" IssueInstant="2014-07-18T01:13:06Z" Destination="http://idp.example.com/SingleLogoutService.php">
  <saml:Issuer>http://sp.example.com/demo1/metadata.php</saml:Issuer>
  <saml:NameID SPNameQualifier="http://sp.example.com/demo1/metadata.php" Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient">ONELOGIN_f92cc1834efc0f73e9c09f482fce80037a6251e7</saml:NameID>
</samlp:LogoutRequest>

Example Logout URL

https://sso.sport80.com/saml/logout?SAMLRequest=fZJfa8IwFMXf%2FRTSd9uk1VqDFgS3UXAKc%2BxhLyNNUxvIn5qbih9%2FsXXghC2PJ%2Bd3bs4lS6BKtmRrjqZzb%2FzUcXCjsT8XJTWQ%2FnYVdFYTQ0EA0VRxII6Rw%2Fp1S%2BIQkdYaZ5iRwQP2P0UBuHXC6AErNqtgv3va7l%2BK3VdKp5jVWYrxIsF1gssZwnWdxtirJY1pVlLM5otyQD%2B4BZ%2BzCnzsLQyg44UGR7XzMorRBKUTnL3jhMwSgtLPwbfxXYWmrqcb51oSRbRzTeifdhaMQygNo7Ix4KJro0j2Wwrynl5eJdLPsvmVBo9zpkJojXUZCplRy%2BjedIft%2FEKKzfjZWEXd35vCIe4VUU3q3kq4okKuq8pygCBnjRVwGzJE3g1pycGbfLlCV%2FySz5Exp2OtSiE7AWra8iw51m52ng4BD%2FbRj%2Frra%2BTf&RelayState=http%3A%2F%2Flocalhost%3A9000%2Fsaml%2Flogout&SigAlg=http%3A%2F%2Fwww.w3.org%2F2001%2F04%2Fxmldsig-more%23rsa-sha512&Signature=U917buZRvMx29iMS88JpxbtzG70K1D%2Bg0HUKjpDAW0oFexoa3e1dNjsdw1DU765RId%2FQ3iz9m4eSkxXs%2F8vvfcBukXMOxgFV55RHq%2Bmh%2BsStiGKKjE6ZFF4p0aTrNLuQc9s7ZsiTZj1gm8saMuzGYh6IUh2d0hBDW54oYIgMjktqMko4glCtaj6u7GMDC4JErcxxOY4qfGrupAEMBGMqMXOfCekwQksG6N3Y%2BvW6SXZ7Q9uK7FnWDR7GhYimMGs6%2FYF%2FPscJEOOO6JTird8BptvqZXBVv1QI9DYS9aLCYvSts0wfMq%2BbGGVtqU2hghkYhiOLRH693RCFCs3LvLcJ8Q%3D%3D
Attachments
SSO.png
268.4 KiB