Delete (or rename) the springSecurityContext.xml file in the [your install directory]/Protect/tomcat/webapps/ProtectManager/WEB-INF/.
Go to the [your install directory]/Protect/tomcat/webapps/ProtectManager/security/template folder and select SpringSecurityContext-SAML.xml template file.
Copy the file SpringSecurityContext-SAML.xml into the [your install directory]/Protect/tomcat/webapps/ProtectManager/WEB-INF/ folder.
Rename the file to springSecurityContext.xml.
Set up the SAML authentication configuration:
Open [your install directory]/Protect/tomcat/webapps/ProtectManager/WEB-INF/ and set the entityBaseURL property to your Enforce URL: https://<host name or IP>/ProtectManager on springSecurityContext.xml file.
Set the property value of "nameID" by editing the property name ="nameID" value in the Spring file to 'unspecified' or another nameID that your IdP supports.
For e.g. <property name="nameID" value=urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified" />
Add the following element in the SpringSecurityContext.xml file under <bean class="org.springframework.security.saml.websso.WebSSOProfileOptions"> section.: <property name="includeScoping" value="false"/>
Add below lines to SpringSecurityContext.xml updated value (highlighting added for clarity on what was changed):
System > Login Management > DLP Users > SAML Name mapping section
This is the data you expect your IdP to return in the SAML Response to DLP to validate a user (such as their email address or other user attributes) (This is case sensitive).
On AD FS management system change setting 'Secure hash algorithm' to SHA1 from SHA256. Note SHA256 is currently not supported for AD FS article 237330.