High-level API for Single Sign On (SAML 2.0)
This module provides high-level API for scalable Single Sign On (SSO) implementation. Developers can easily configure the Service Providers and Identity Providers by importing the corresponding metadata. SAML2.0 provides a standard guide but leaves a lot of options, so we provide a simple interface that's highly configurable.
To install the stable version
$ npm install express-saml2
var saml = ;
See full documentation here
Data encryption algorithms
Key encryption algorithms
/examples folder, there are three entities (1 IdP and 2 SPs). They are at port 3001, 4002 and 4003.
Without using Single Sign On, users have to remember several pairs of username/password in order to log into different internal applications.
SAML proposes two ways to initiate Single Sign On, they are respectively Service Provider Initiated SSO and Identity Provider Initiated SSO. In SP-initated SSO, the user attempts to access SP but their federated identity is authenticated by IdP, so they first have to log on IdP, then IdP sends back a SAML assertion response to SP, and finally SP creates a session to user in order to access the resources.
In the approach of IdP-initated SSO, IdP provides links which refers to the resources in service providers. In this use case, users don't need to visit SP first.
IdP-initiated Single Logout is also provided and relied on relay state. IdP provides a link refers to the single logout endpoints in one of those participated service providers (SP1). The selected SP sends back a logout response to IdP with relay state which is the logout endpoint URL of next participated service provider (SP2), user finally log out IdP when all participated SP is logged out.
Copyright (C) 2016-2017 Tony Ngan, released under the MIT License.