🔐 Example SAML Identity Provider
This is a simulated multi-tenant SAML 2.0 Identity Provider for testing the AuthBroker.
Each tenant represents a municipality with its own user directory and signing certificate.
Configured Tenants
Import Allowed Service Provider Metadata
Registered Service Providers for Strict Mode
0 No SP metadata imported yet for strict validation.
Test Users
Username
Password
Name
Email
Role
kristianstad.user1
Test1234!
Kristianstad User1
kristianstad.user1@kristianstad.se
admin kristianstad.user2
Test1234!
Kristianstad User2
kristianstad.user2@kristianstad.se
handlaggare
Active SP Sessions
3
🔄 Refresh SP Entity ID
User
Session Index
Authenticated At
Actions
https://authbroker.arbetsmiljoverktyget.se/saml/kristianstad
Kristianstad User1 (kristianstad.user1)
ca8ae331-a0ae-4bd1-b772-496cbcf0fc86
2026-03-11 16:18:20
🚪 IdP Logout
https://authbroker.arbetsmiljoverktyget.se/saml/kristianstad
Kristianstad User1 (kristianstad.user1)
a44c2c67-325d-4529-b99f-7d961ecea638
2026-03-11 16:18:12
🚪 IdP Logout
https://authbroker.arbetsmiljoverktyget.se/saml/kristianstad
Kristianstad User1 (kristianstad.user1)
c032efc3-78f2-4afa-bc66-3df8c106bb67
2026-03-11 16:17:56
🚪 IdP Logout
Registered Service Providers for Strict Mode
0 No SP metadata imported yet for strict validation.
Test Users
Username
Password
Name
Email
Role
tanum.user1
Test1234!
Tanum User1
tanum.user1@tanum.se
admin tanum.user2
Test1234!
Tanum User2
tanum.user2@tanum.se
handlaggare
Active SP Sessions
2
🔄 Refresh SP Entity ID
User
Session Index
Authenticated At
Actions
https://authbroker.arbetsmiljoverktyget.se/saml/tanum
Tanum User1 (tanum.user1)
7e939cf9-4933-4847-a11d-dbf3a6a17ec0
2026-03-11 16:18:43
🚪 IdP Logout
https://authbroker.arbetsmiljoverktyget.se/saml/tanum
Tanum User1 (tanum.user1)
5a2bb4b8-323d-4988-b0c7-c25c6eaf54b1
2026-03-11 16:18:36
🚪 IdP Logout
How it works
The consuming application redirects the user to AuthBroker's login endpoint.
AuthBroker creates a SAML AuthnRequest and redirects the browser to this IdP's SSO URL.
This IdP presents a login form. The user enters their test credentials.
The IdP creates a signed SAML Response and auto-POSTs it to AuthBroker's ACS endpoint.
AuthBroker validates the assertion, extracts claims, and redirects the user back to the application.
Strict Mode Guidance
Default mode is permissive for fast local testing on first startup.
Enable strict mode per tenant after importing AuthBroker SP metadata.
In strict mode, invalid or unsigned AuthnRequests are rejected before the login form is shown.