This is an example SAML SP service written using Flask and pysaml2.
- Python 2.7+
- Virtualenv
- pip
You will also need a development environment capable of compiling Python packages and the "libffi" and "libxmlsec1" development libraries, which are needed by PySAML2.
Instructions for installing these development libraries will differ depending on your host operating system.
$ brew install libffi libxmlsec1
$ sudo yum install libffi-devel xmlsec1 xmlsec1-openssl
$ virtualenv venv
$ source venv/bin/activate
$ pip install -r requirements.txt
$ python app.py
The fastest way to test this example SAML SP is to use the saml.oktadev.com service.
Here is how:
-
Edit the "app.py" file and uncomment the line in the "test" line in "metadata_url_for" dictionary.
$ $EDITOR app.py
Change this line:
# 'test': 'http://idp.oktadev.com/metadata',
To this:
'test': 'http://idp.oktadev.com/metadata',
-
Start the example SAML SP
$ python app.py
-
Start ngrok on the port that the example SAML SP is running on. By default, the example SAML SP runs on TCP 5000.
$ ngrok http 5000
You will need to install ngrok if you haven't already.
Here is what it should look like:
-
Run saml.oktadev.com to test this example SAML SP
-
Load saml.oktadev.com in your browser and fill out as follows:
Issuer: "urn:example:idp"
SAML ACS URL: "http://REPLACE_ME.ngrok.com/saml/sso/test"
SAML Audience URI: "http://REPLACE_ME.ngrok.com/saml/sso/test"
Be sure to replace the string "REPLACE_ME" with the sub-domain that ngrok selected for you!
-
Click the "Submit" button.
-
After successfully completing the steps in the "Testing" section above, select the "Run security validation" option to have saml.oktadev.com run an extended series of security tests against your SAML SP.
Updates or corrections to this document are very welcome. Feel free to send pull requests with suggestions.
Additionally, comments or questions can be sent to: developers@okta.com