Personnalisé
Casdoor prend en charge la configuration d'un fournisseur SAML personnalisé, et vous pouvez utiliser Casdoor comme un fournisseur de services (SP) pour se connecter à n'importe quel fournisseur d'identité (IDP) qui prend en charge le protocole SAML 2.0.
Étape 1. Configure your Identity Provider
When setting up your Identity Provider (such as Google Workspace, Azure AD, Okta, or any other SAML 2.0 compatible IdP), you'll need to provide the following Casdoor SP information:
ACS URL (Assertion Consumer Service URL):
https://<your-casdoor-domain>/api/acs- Example:
https://door.example.com/api/acs - This endpoint only accepts POST requests
- Example:
Entity ID (SP Entity ID):
https://<your-casdoor-domain>/api/acs- Use the same URL as your ACS URL
Replace <your-casdoor-domain> with your actual Casdoor domain. For example, if your Casdoor instance is running at http://localhost:8000, use http://localhost:8000/api/acs for both values.
Étape 2. Obtenez les métadonnées de l'IDP
After configuring your IdP, obtain the metadata, which is an XML document that describes the configuration information of the services provided by the IdP. Il doit inclure des informations telles que EntityID, SSO Endpoint, etc.
Certains IDP, tels que Keycloak, exigent des informations SP pour fournir des métadonnées. You can refer to the document Keycloak.
Step3. Configurez le fournisseur SAML personnalisé
After obtaining the metadata from your IdP, create a SAML Custom Provider in Casdoor and fill in the necessary information.
| Champ | Description |
|---|---|
| Category | Choisissez SAML |
| Type | Choisissez Personnalisé |
| Favicon.URL | L'URL du logo de l'IDP |
| Metadata | Les métadonnées de l'IDP |
Then click Parse button, and fields Endpoint, IdP, Issuer URL, SP ACS URL and SP Entity ID will be automatically parsed.

Finally, add the SAML Custom Provider to Providers of the application. 