There's a requirement to validate the signature of an incoming SOAP AuthN request against an x509 certificate in the certificate store. The gateway is using the internal identity provider.
API Gateway 10.x, 11.x
When validating a signed SAML AuthN Request our code parses the KeyInfo element (specification), if you want to bypass the Keynfo from the incoming request the gateway can validate the signature against x509 certificate that has been load into the gateway certificate store
.
Always override KeyInfo in signature element with selected certificate - Select this check box to always use the selected certificate, regardless of whether the <ds:keyInfo> element specifies a certificate
Clear this check box to use the selected certificate only if the <ds:keyInfo> element does not specify a certificate. If it does, it will be used instead of the selected certificate. This setting is the default.