Handle SAML Callback
Base64-encoded SAML response from the Identity Provider
Optional relay state parameter passed during login initiation
“OK”, “INVALID_RELAY_STATE_ERROR”, “INVALID_CLIENT_ERROR”, “SAML_RESPONSE_VERIFICATION_FAILED_ERROR”, or “IDP_LOGIN_DISALLOWED_ERROR”
The URI to redirect the user back to your application, including any authentication tokens or codes
Response Status Codes
OK
SAML assertion was successfully validated. TheredirectURI contains the callback URL with authentication information.
INVALID_RELAY_STATE_ERROR
The relay state parameter is invalid or doesn’t match the expected format.INVALID_CLIENT_ERROR
The SAML client configuration referenced in the assertion is not found or invalid.SAML_RESPONSE_VERIFICATION_FAILED_ERROR
The SAML assertion failed signature verification or validation. This could indicate:- Invalid signature
- Expired assertion
- Assertion conditions not met
- Certificate mismatch
IDP_LOGIN_DISALLOWED_ERROR
IdP-initiated login was attempted but is not enabled for this client.Usage
This endpoint is typically called automatically when the Identity Provider redirects back to your application after authentication. The SAML response is usually sent via HTTP POST from the IdP to your Assertion Consumer Service (ACS) URL.HTML Form Example
Backend Processing