SAML SP Test | IdP Integration, Metadata, and AuthnRequest Checks
Use this public guide when you want to connect to a remote IdP and test this environment as a SAML SP. It covers IdP metadata registration, SP metadata setup, ACS / SLO checks, AuthnRequest tuning, and NameID / attribute verification.
Load this environment's SP metadata into the remote IdP
Start login from the SP test screen and inspect the returned attributes
URLs Used On This Page
Metadata
https://sp.samltest.kmmr.jp/metadata/
ACS
https://sp.samltest.kmmr.jp/acs/
SLO
https://sp.samltest.kmmr.jp/slo/
What You Can Adjust in SP Testing
Switch login and logout bindings from the endpoints exposed by the saved metadata.
Set RequestedAuthnContext, Comparison, ForceAuthn, and isPassive.
Choose whether to send NameIDPolicy and specify its Format and AllowCreate value.
Control Scoping IDPList, AudienceRestriction, and whether the AuthnRequest is signed.
What You Can Inspect in SP Testing
The console shows the connected IdP, NameID, NameID Format, and SessionIndex after authentication.
Returned attributes are listed by name and value.
The SAML Response analysis, signature verification results, and decrypted contents are shown when needed.
During logout, you can distinguish between local SP logout and remote IdP SLO behavior.
Saved State and Loading UI
Remote metadata is stored only in the current browser session. The loading-screen duration is stored in this browser's localStorage and reused on later visits.
When To Use This SP Test Guide
Use this guide when you need to test SAML login against a remote IdP such as Entra ID, Okta, Keycloak, or another SAML product while treating this site as the SP. The main focus is ACS, EntityID, AuthnRequest behavior, and returned attributes.
SP Test Checklist
Collect the remote IdP metadata XML or metadata URL.
Make sure the remote IdP can load this environment's SP metadata.
Confirm EntityID, ACS URL, SLO URL, and any signing-certificate requirements.
Define the expected NameID format, required attributes, and whether signed AuthnRequests are needed.
Common SP Test Failure Points
The ACS URL is registered incorrectly, so the browser does not return to the expected location after login.
The IdP requires signed AuthnRequests, but request signing is disabled.
NameIDPolicy or RequestedAuthnContext is too strict for the IdP configuration.
EntityID or certificate data remains stale because the wrong metadata version is still in use.
Related Public Pages
You can jump back to the main SAML test entry or switch to the reverse-direction SAML IdP testing guide.
You can inspect IdP metadata import, AuthnRequest options, ACS return behavior, NameID, attributes, SAML Response signature verification, and decrypted content when relevant.
What is the ACS URL?
The AssertionConsumerService URL is the endpoint where the IdP posts the SAML Response. It is one of the most common SP configuration mistakes.
Can this guide help me check SLO?
Yes. You can review the SLO endpoint in metadata and distinguish local SP logout from remote IdP SLO behavior during logout testing.
How is NameID different from attributes?
NameID is the primary subject identifier for the session, while attributes carry additional values such as mail or displayName. Different SPs rely on them differently.
When should I sign the AuthnRequest?
Sign it when the IdP requires signed requests. The environment adds a query signature for HTTP-Redirect and an XML signature for HTTP-POST.
If you found this tool helpful, we’d love for you to share it on social media!
We display ads to support the operation of this site. We understand that it may be inconvenient, but we
appreciate your understanding.