SaaS Application Configuration Guide : Gildan¶
BIG-IP as SAML IdP Configuration¶
This document describes the configuration for a SAML Identity Provider for SaaS Application workflow using a SaaS Application template. Follow the steps below to configure Gildan:
- Logon to the BIG-IP user interface and click
- Select the Federation category.
- Select SAML Identity Provider for SaaS Application to configure BIG-IP as a SAML Identity Provider.
- Review the Required Configuration information, and complete the following required step before you configure the SaaS Application.
- Provide the Identity Provider details.
- Provide the Virtual Server configuration details.
- Configure the Authentication method to use for the SAML Identity Provider.
- After you confgure the SaaS Application Configuration, configure (optional) Endpoint Checks and Customization settings.
Gildan Configuration in Guided Configuration Workflow¶
The SaaS Application screen displays a list of applications from which you can select to configure SAML Service Provider applications. Select a specific application and click Add.
For example, to configure Gildan, select Gildan and click Add.
Common Application Properties¶
- Specify the application name. The system uses the name internally, to identify configuration details for the application and the SAML service provider for it.
- Select whether the application supports IDP Initiated requests. Select the IdP Initiated option to display the application resource on the Webtop.
- Specify or modify the caption. The Webtop uses the caption to display the application resource.
- Specify an optional description for the application.
Application Specific Properties¶
- To configure Gildan provide following inputs:
- Sub Domain : Provide the sub domain. For eg - If the entity Id is https://company.gildan.com, then the sub domain is company.
Additional SAML Attributes and ACS Properties¶
- Configure any additional attribute values to include in the SAML assertion to SaaS Application. Each SAML Attribute has an attribute name and attribute value. The session variable values can specify attribute values. Configure an AD or LDAP query to include specific attributes in session variables.
- Configure an additional Assertion Consumer Service URI if the application requires such a URI.
- Specify whether to sign the assertion and response, and specify the signing algorithm.
- Specify whether to require a signed Authentication Request. If required, select a signing certificate.
- Specify whether to encrypt assertions. If required, speciofy the encryption algorithm and select the encryption certificate.
- Complete the workflow configuration by configuring optional endpoint checks and customization.
Deploy the Configuration¶
- Deploy the configuration from the Summary screen.
- To retrieve the metadata for this configuration, navigate to .
- Select the SAML SSO object created for Gildan, and click Export Metadata.
- Use the exported IdP SAML Metadata to configure the IdP Provider configuration in the Gildan service.
Setup Gildan as SAML Service Provider¶
Refer to Gildan documentation to set it up as SAML Service Provider.
Test the Configuration¶
- To test the configuration, click on the link Click to test configuration on the Summary page.
- A succesful logon should display a Webtop that includes the IdP Initiated Applications.