If you have existing SAML identity provider software it is possible to use that to sign in to OpenAthens.
This page specifies what your IdP software must be configured to support in order to successfully connect to OpenAthens and is based on the Interoperable SAML 2.0 Web Browser SSO Deployment Profile which is the specification OpenAthens adheres to.
- We RECOMMEND using SAML 2.0
- A SAML 2.0 metadata document MUST be made available via a URL or xml file
- Metadata MUST contain an <md:IDPSSODescriptor> element
- Metadata SHOULD NOT contain an <md:SPSSODescriptor> element
- The urn:oasis:names:tc:SAML:2.0:nameid-format:transient name identifier format MUST be supported
- A persistent user identifier attribute MUST be passed to OpenAthens as part of the attribute statement. This value MUST be consistent for a given user account between different logins.
- When receiving a SAML request (<saml2p:AuthnRequest>) from OpenAthens the HTTP-REDIRECT binding MUST be supported
- SAML responses (<saml2p:Response>) to OpenAthens MUST be sent using the HTTP-POST binding and MUST be signed
- Additional attributes MAY be passed to us as part of the attribute statement to categorise users within OpenAthens
Metadata for local connections into OpenAthens
This is specific to your connection and is available from the connection in the admin interface on the relying party tab.