Skip to main content
Skip table of contents

Memority IdP Federation Certificates

Memority provides several federation certificates to sign SAML assertions and OAuth2/OpenID Connect tokens.

You are free to use any of the certificates detailed below for your federation.
However, keep in mind that certificates expire and must be updated on both the Memority side and the application side to keep the federation operational.

This page describes the available federation certificates and the steps to manage and maintain these certificates over time.

Certificates Overview

All certificates have a 5-year validity period and new ones are generated annually. This allows assigning a full 5-year lifetime certificate to any new federation.

Memority generates two certificate types each year:

  • RSA 3072 with SHA 256 certificate used as the default certificate

  • RSA 2048 with SHA 256 certificate used for retrocompatibility with legacy applications

We recommend using the default certificate RSA 3072 with SHA 256 whenever possible.

In total, 10 certificates are available at a time. However, you don’t need to manually select a certificate when configuring a federation. Memority automatically uses the newest RSA 3072 certificate as the default for any new federation.

Generation date

RSA 3072 Certificate

RSA 2048 Certificate

Year n-4

Certificate used for compatibility with federations created in year n-4

Certificate used for compatibility with federations created in year n-4

Year n-3

Certificate used for compatibility with federations created in year n-3

Certificate used for compatibility with federations created in year n-3

Year n-2

Certificate used for compatibility with federations created in year n-2

Certificate used for compatibility with federations created in year n-2

Year n-1

Certificate used for compatibility with federations created in year n-1

Certificate used for compatibility with federations created in year n-1

Year n

Default certificate for all new federations

Certificate used for new federations with legacy applications

Setting Up a New Federation

To federate a new application, use the federation widget that is usually available in the application features. Its usage is described in the Federation page.

In this section, you will find recommendations to set up a federation that complies with Memority’s certificate policy.

Identifier

Recommendation

NF01

Use OAuth2/OpenID Connect instead of SAML2 to create new federations.
OAuth2/OpenID Connect integrates native processes to automatically manage certificate expiration and avoid related issues.

NF02

Use the default certificate to ensure you are using the newest and safest certificate for your federation.

OAuth2/OpenID Connect Federations

OAuth2/OpenID Connect natively supports certificate updates. No additional configuration is needed.

The available certificates are listed in the JWKS endpoint, which you can access from the federation interface.

image-20251106-091950.png
image-20251106-092000.png

OAuth2/OpenID Connect endpoints

SAML & WS-Fed Federations

SAML and WS-Fed do not provide native mechanisms for certificate updates on expiration. However, some applications support URL metadata configuration.

These applications can pull IdP metadata from the URLs below, including certificates, and automatically update the used certificate on expiration.

Metadata URLs:

SAML

%YOUR_TENANT_URL%/sso/v2/saml2/metadata/metaAlias/%IDP_META_ALIAS%

For example: https://sso.tenant.memority.com/sso/v2/saml2/metadata/metaAlias/tenant/idp-b94c78b1-25c4-44ec-aa33-21ea64669130

WS-Fed

%YOUR_TENANT_URL%/sso/v2/wsfed/metadata/metaAlias/%IDP_META_ALIAS%

For example: https://sso.tenant.memority.com/sso/v2/wsfed/metadata/metaAlias/tenant/idp-b94c78b1-25c4-44ec-aa33-21ea64669130

Identifier

Recommendation

NF03

Use SAML/WSFed metadata URL configuration whenever possible: it will provide automatic certificate updates upon its expiration

If the application doesn’t support metadata URLs, set your federation as usual. You will need to manually update the federation to change the certificate after 5 years.

Updating a Federation

When the federation’s certificate is about to expire, you need to update it to keep the federation operational.

Monitoring Certificate Expiration

Each federation displays the certificate currently in use together with its expiration date in the Advanced Configuration section. If the certificate is about to expire, a warning message appears above the federation configuration.

image-20251106-094248.png

Warning message about the federation’s certificate expiration

Identifier

Recommendation

UF01

Set a governance process to monitor and detect federation’s certificate expiration using Memority monitoring tools.

UF02

Begin the federation update process as soon as you detect the certificate expiration: when a certificate expires, it can impact several federations and generate additional work for both administrators and application owners.

Updating OAuth2/OpenID Connect Federations

OAuth2/OpenID Connect federations do not require any specific update procedure. Certificate updates are handled automatically through the JWKS endpoint.

Updating SAML Federations

When a SAML federation certificate is approaching expiration, we recommend contacting the application’s owner to inform them about the expiration, the updates they need to do, and to verify the application capabilities.

Based on the information you receive, you can select the best update scenario from the following:

Identifier

Application capacity

Recommendation

UF03

The application supports OAuth2/OpenID Connect

Switch the federation to OAuth2/OpenID Connect and benefit from automatic certificate management

UF04

The application supports SAML metadata URLs

Switch the federation to SAML metadata URL configuration

UF05

The application’s owner is known and available

Perform a synchronous certificate update

UF06

The application’s owner is unknown, unavailable, works through an integrator or requires more time

Perform an asynchronous certificate update

The procedures below describe how to update a federation depending on the chosen recommendation.

Switching to OAuth2/OpenID Connect

Step

Screenshot

1

Create a new application and set the OAuth2/OpenID Connect federation

image-20251126-100953.png

2

Add the required access rights to the application roles so that users can see the application

image-20251126-101111.png

3

Set the federation for the new application

image-20251126-101202.png

4

Disable the legacy application

image-20251126-101242.png

5

Remove legacy access rights from the application roles

image-20251126-101111.png

Switching to SAML Metadata URL Configuration

Step

Screenshot

1

From the existing federation, retrieve the metadata URL and send it to the application

  • SAML: %YOUR_TENANT_URL%/sso/v2/saml2/metadata/metaAlias/%IDP_META_ALIAS%

  • WSFed: %YOUR_TENANT_URL%/sso/v2/wsfed/metadata/metaAlias/%IDP_META_ALIAS%

2

Configure the application’s federation using the URL metadata

Performing a Synchronous Certificate Update

In this procedure, the federation will be unavailable between steps 1 and 3.
This operation usually lasts several minutes. However, make sure you save the previous configuration to allow rollback if necessary.

Step

Screenshot

1

In the existing federation, switch to the newest certificate (RSA 3072 recommended)

image-20251126-102410.png

2

Export the IdP metadata from the federation widget and send it to the application

image-20251126-101709.png

3

Configure the application federation using IdP metadata

Performing an Asynchronous Certificate Update

Step

Screenshot

1

Create a new application and configure a SAML federation using the newest certificate

image-20251126-100953.png
2

Add the relevant access rights to the application roles so users can see the application

image-20251126-101111.png
3

Set the federation for the new application

image-20251126-102042.png

4

Disable the legacy application

image-20251126-101242.png
5

Remove legacy access rights from the application’s roles

image-20251126-101111.png

Recommendations

This list contains all the recommendations described on this page.

Identifier

Use case

Recommendation

NF01

Set federation

Use OAuth2/OpenID Connect instead of SAML2 to create new federations.
OAuth2/OpenID Connect integrates native processes to automatically manage certificate expiration and avoid related issues.

NF02

Set federation

Use the default certificate to ensure you are using the newest and safest certificate for your federation.

NF03

Set SAML federation

Use SAML metadata URL configuration whenever possible: it will provide automatic certificate updates upon its expiration.

UF01

Update federation

Set a governance process to monitor and detect federation’s certificate expiration using Memority monitoring tools.

UF02

Update federation

Begin the federation update process as soon as you detect the certificate expiration: when a certificate expires, it can impact several federations and generate additional work for both administrators and application owners.

UF03

Update SAML federation

The application is compatible with OAuth2/OpenID Connect

Switch the federation to use OAuth2/OpenID Connect and benefit from automatic certificate management.

UF04

Update SAML federation

The application is compatible with SAML metadata URL configuration

Switch the federation to use SAML metadata URL configuration.

UF05

Update SAML federation

The application owner is known and available

Perform a synchronous certificate update.

UF06

Update SAML federation

The application owner is unknown, unavailable, works through an integrator or requires more time

Perform an asynchronous certificate update.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.