A RealMe login service SAML v2.0 AuthnRequest is sent from a SAML Service Provider (SP) and initiates a SAML v2.0 response at the MTS IdP.
As the majority of integrations use products or code libraries that comply with the OASIS SAML v2.0 standard, developers should focus on the RealMe requirements that differ in some way from the OASIS Standard or have additional NZ specific constraints.
The following list of the key RealMe SAML message request parameters highlights the ones that are most likely to need close attention. Refer to RealMe request parameters for more detail.
The signature is generated by signing the base64 and URL encoded AuthnRequest combined with the RelayState (if present in the request) and the URL representation of the signature algorithm. A sample SAML v2.0 AuthnRequest is shown below:
You can submit the content of the SAMLRequest here.
Or send a request directly from your browser by appending your SAML Request to the MTS endpoint (as provided in the RealMe login service IdP metadata file).
Once your SAML v2.0 AuthnRequest passes successful SAML v2.0 messaging validation, schema validation and signature validation, you are redirected to an outcome page, where you can initiate a SAML v2.0 response.
If your SAML v2.0 AuthnRequest does not pass validation, the relevant error messages are provided to assist you in resolving the error, so you can try again.