SAML (Security Assertion Markup Language) is a new feature in 10.0 and is an alternative to Active Directory / LDAP based Single Sign On (SSO).
For more information about SAML and/or how to configure please refer to the admin guide for 10.0.
This article explains how to enabled SAML from the webui.
NOTE: For ORG-Enabled SMAs SAML will need to be configured for each ORG. Also, SAML is not available for the systemui as only local admin accounts are able to log into the systemui.
解决办法
To enable SAML please follow the steps below:
NOTE: The URL and/or XML Metadata needed to enable SAML should be obtained from an Identity Provider (IdP). These values can be entered manually, by using the metadata xml provided by the IdP, or loading the metadata directly from the metadata URL of the IdP (recomended).
Log in to the admin portal.
Go to Settings | SAML Configuration.
Click on the "SAML Service Provider Enabled" check box.
If using the IdP URL option then click "Get Metadata from IdP".
Copy/Paste URL into the IdP Metadata URL field and click "Import IdP Metadata".
If using the IdP XML Metadata option then click "Enter XML Metadata".
Copy/Paste XML into the IdP Metadata XML field and click "Import IdP Metadata".
To view the IdP Metadata information click on "View Metadata".
Select preferred IdP Attribute Mapping - "Use Local User Table, Use LDAP Lookup, or Use SAML".
Click Save.
NOTE: For SAML to work correctly the SMA (Service Provider) has to be registered with the IdP being used. The SP Entity Identifier (url) and other SP information can be obtained from the "Local Service Provider (SP) Settings" section of the SAML page by clicking "View Metadata".