Configure PAS for OpenEdge to be a SAML service provider
- Last Updated: January 26, 2026
- 1 minute read
- OpenEdge
- Version 13.0
- Documentation
Edit instance-dir/webapps/web-app-name/WEB-INF/oeablSecurity.properties to enable the use of SAML for a single web application and to work with the Okta application, complete the following:
- Edit the oepas1/webapps/ROOT/WEB-INF/oeablSecurity.properties for the single
web application named ROOT.
- Enable SAML by setting the
client.login.modeltosaml.client.login.model=saml - Set the identity provider metadata location. Use the URL Identity Provider Metadata saved during the
"Configure the identity provider" steps.
samlToken.metadata.idpMetaDataFileLocation=https://IdPMetadataURL/metadata - Based on the Okta application, set the following
properties.
Table 1. Properties based on Okta settings Property in oeablSecurity.properties Based on Okta setting samlToken.validation.validAudiences=/saml2/metadata/oepas1Audience URI (SP Entity ID) samlToken.UserDetails.roleAttrName=userAuthoritiesAttribute statements (optional) - NameuserAuthorities
"/rest/**","*","hasAnyRole('ROLE_PSCUser')"Attribute statements (optional) - Name format Unspecified
- Based on the ABL application, set the following properties.
Table 2. Properties derived from ABL application settings Property in oeablSecurity.properties ABL application settings samlToken.UserDetails.rolePrefix=ROLE_This is the default. - Save the file. Note: This guide introduces the basic properties required. For more information on the available SAML properties, see $DLC/servers/pasoe/conf/oeablSecurity.properties.README.
PAS for OpenEdge supports SAML logout functionality. For simplicity, the logout properties are not addressed in this guide.
For more information on SAML logout support, see Support for SAML in PAS for OpenEdge
- Enable SAML by setting the