Edit file File name : hslavich_onelogin_saml.yaml Content :hslavich_onelogin_saml: # Basic settings idp: entityId: '<idp-entity>' singleSignOnService: url: '<idp-single-sign-on-url>' binding: 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect' singleLogoutService: url: '<idp-single-logout-url>' binding: 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect' certFingerprint: '' sp: entityId: 'https://<your-instance-host>/' assertionConsumerService: url: 'https://<your-instance-host>/saml/acs' binding: 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST' singleLogoutService: url: 'https://<your-instance-host>/saml/logout' binding: 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect' privateKey: '/var/www/html/docroot/certs/key.pem' # Optional settings baseurl: 'https://<your-instance-host>/saml' strict: true debug: true security: nameIdEncrypted: false authnRequestsSigned: false logoutRequestSigned: false logoutResponseSigned: false wantMessagesSigned: false wantAssertionsSigned: false wantNameIdEncrypted: false requestedAuthnContext: true signMetadata: false wantXMLValidation: true signatureAlgorithm: 'http://www.w3.org/2001/04/xmldsig-more#rsa-sha256' digestAlgorithm: 'http://www.w3.org/2001/04/xmlenc#sha256' contactPerson: technical: givenName: 'Tech User' emailAddress: 'techuser@example.com' support: givenName: 'Support User' emailAddress: 'supportuser@example.com' organization: en: name: 'Example' displayname: 'Example' url: 'http://example.com' Save