FME Flow: 2025.0

SAML Configuration

Select User Management > Authentication Services. On the Authentication Services page, select the SAML Configuration tab.

When enabled, you can incorporate users from your organization's Security Assertion Markup Language (SAML) identity provider for authentication with FME Flow.

Note  Authentication with FME Flow through SAML is not supported in the following FME Form transformers: FMEFlowJobSubmitter, FMEFlowNotifier, FMEFlowResourceConnector, FMEFlowJobWaiter, FMEFlowLogFileRetriever.

How It Works

With SAML configuration, SAML identity provider users who log in to FME Flow are redirected to the identity provider for authentication. Once authenticated, the identity provider sends a SAML assertion back to FME Flow.

The SAML assertion includes identity provider attributes that map to corresponding User attributes in FME Flow, such as User name and Email. If these attributes are not specified explicitly in the configuration, default values are assigned. For example, if the identity provider is Azure Active Directory, User name maps to the Azure AD name.

The FME Flow Role to which a user is assigned can also be mapped to a corresponding attribute on the identity provider. If a mapping is not defined or cannot be determined, a default role is assigned as specified explicitly in the configuration. The values of the mapped role on the identity provider must match existing roles in FME Flow.

When an identity provider user first logs in to FME Flow after SAML configuration is complete, FME Flow parses the attributes from the assertion to create a new user account. This just-in-time account creation ensures that only users who need access to FME Flow have accounts. Importing users and groups manually from a SAML identity provider is currently not supported.

Troubleshooting Login Failures with SAML Identity Provider Credentials

Getting Started

To authenticate on FME Flow with a SAML identity provider, you must configure settings in two places:

  • On your SAML identity provider.
  • On FME Flow.
Note  If your FME Flow architecture includes a reverse proxy or load balancer, additional configuration is required:
  • Append the fully-qualified hostname of your reverse proxy to the fmeserver.saml.custom.baseurl= line in the SAML application.properties file. If your FME Flow uses an Apache Tomcat web application server provided with the installation, this file is located in <FMEFlowDir>\Utilities\tomcat\webapps\fmesaml\WEB-INF\classes\. When complete, Restart FME Flow.

Viewing SAML Logs

Log files fmesaml.log and restV4.log can be found in Services Logs.

fmesaml.log records:

  • When a user account is created on initial login to FME Flow through Sign in with SAML.
  • Subsequent logins to FME Flow through Sign in with SAML.

restV4.log records any problems encountered during SAML configuration.

For more information, see About Log Files in FME Flow.