Expand my Community achievements bar.

SOLVED

Read SAML received from Okta

Avatar

Level 2

Hi,

 

I have integrated my local AEM with Okta. I am receiving the SAML respond with configured custom attributes. 

Seeking guidance to read and display those attribute in one of the component. Can anyone let me know how can I read the SAML in controller of the component.

1 Accepted Solution

Avatar

Correct answer by
Community Advisor

Create an AuthenticationPostProcessor to parse the samlresponse after successful authentication and store the values to the user profile, the profile data can be used later in any of the components.

Refer https://techforum.medium.com/adobe-experience-manager-reporting-on-users-last-login-date-e2035021cb9... for enabling the Custom AuthenticationPostProcessor and storing the values to the user profile.

Refer https://apoorva-ganapathy.blogspot.com/2016/08/aem-processing-saml-response-using.html for processing the samlresponse.

Regards

Albin I

www.albinsblog.com

View solution in original post

4 Replies

Avatar

Correct answer by
Community Advisor

Create an AuthenticationPostProcessor to parse the samlresponse after successful authentication and store the values to the user profile, the profile data can be used later in any of the components.

Refer https://techforum.medium.com/adobe-experience-manager-reporting-on-users-last-login-date-e2035021cb9... for enabling the Custom AuthenticationPostProcessor and storing the values to the user profile.

Refer https://apoorva-ganapathy.blogspot.com/2016/08/aem-processing-saml-response-using.html for processing the samlresponse.

Regards

Albin I

www.albinsblog.com

Avatar

Level 5
I don't believe you need to create a Post Processor as you can map the fields in the SAML Configuration as properties to the user profile node.

Avatar

Level 2
Thanks for the respond. We are not allowed to save data in User Profile as it is sensitive data. Is there any other way by which I can parse the saml in component's controller.

Avatar

Community Advisor

I missed this, you can map the profile attributes through the SAML Authentication handler, even the handler have the option to store SAML response to the profile if required

 

SAML.png