Loading
Salesforce now sends email only from verified domains. Read More
Identify Your Users and Manage Access
Table of Contents
Select Filters

          No results
          No results
          Here are some search tips

          Check the spelling of your keywords.
          Use more general search terms.
          Select fewer filters to broaden your search.

          Search all of Salesforce Help
          Configure SAML Single Logout with Salesforce as the Service Provider

          Configure SAML Single Logout with Salesforce as the Service Provider

          Configure single logout (SLO) for a SAML identity provider. With SAML SLO, users can log out of either Salesforce or the identity provider to log out of both of them.

          Required Editions

          Available in: both Salesforce Classic and Lightning Experience

          Federated Authentication is available in: All Editions

          Delegated Authentication is available in: Professional, Enterprise, Performance, Unlimited, Developer, and Database.com Editions

          Authentication Providers are available in: Professional, Enterprise, Performance, Unlimited, and Developer Editions

          User Permissions Needed
          To view the settings: View Setup and Configuration
          To edit the settings:

          Customize Application

          AND

          Modify All Data

          Before you configure SAML SLO, review this information.

          • If the identity provider sends more than one session index parameter, Salesforce stores only the first one that it receives. The session index parameter can’t be more than 512 characters.
          • You can configure a custom logout URL and identity provider SLO URL. If Salesforce is the service provider and initiates the logout request, the identity provider can post a logout response to redirect the user back to Salesforce. In this scenario, Salesforce sends the user to the custom URL upon logout. If the identity provider doesn’t redirect the user back to Salesforce in a logout response, the identity provider determines the SLO redirect URL upon logout.
          • Some identity providers don’t support logout initiated by the service provider. In this case, skip to step 6 in the setup. Users are logged out of Salesforce when initiated by the identity provider. However, logging out of Salesforce doesn’t necessarily log the user out of the identity provider session.
          • Salesforce currently supports front-channel SLO only, meaning that SLO redirects must occur in the same browser. Salesforce doesn’t support SLO across different browsers.

          Before configuring SAML SLO, prepare by gathering this information.

          • Get the Issuer URL from the identity provider. This URL uniquely identifies your SAML identity provider. SAML assertions sent to Salesforce must match this value exactly in the <saml:Issuer> attribute of SAML assertions.
          • Get and save the certificate for validating signatures from the identity provider.
          • Get the SLO URL from the identity provider.
          1. In Setup, in the Quick Find box, enter Single Sign-On Settings, and then select Single Sign-On Settings.
          2. In SAML Single Sign-On Settings, select New.
          3. On the SAML Single Sign-On Settings page, enter the SAML single sign-on (SSO) information, and select Single Logout Enabled.
          4. To apply the selected Request Signature Method (RSM) during SLO, select Use Selected Request Signature Method for Single Logout. This setting uses the RSM that you selected during SSO to determine the RSM and digest algorithm for SLO. If you don’t select this option, the default RSM (RSA-SHA1) and digest algorithm (SHA1) are applied.
            Note
            Note For configurations created before Spring ’22, with which you can use a different RSM and digest algorithm for SSO, this SLO setting is independent of the SSO digest algorithm. Ultimately, only the RSM used for SSO determines which RSM and digest algorithm are used if you select Use Selected Request Signature Method for Single Logout. For more information, see Configure Salesforce as the Service Provider with SAML Single Sign-On.
          5. For Identity Provider Single Logout URL, enter the SAML SLO endpoint of the identity provider.
            • When Salesforce initiates the logout, it sends the logout request with the session index parameter to this SLO endpoint.
            • When the identity provider initiates the logout request, Salesforce sends the logout response to this SLO endpoint.
            • In addition to the identity provider SLO URL, you can define a custom URL. If Salesforce initiates the logout, the identity provider can post a logout response to redirect the user back to Salesforce. In this scenario, Salesforce sends the user to the custom URL upon logout.
            Single Logout for SAML IdP
          6. Select the Single Logout Request Binding type to use for SLO when initiated by the service provider. The binding type determines where to put the LogoutRequest or LogoutResponse in the SAML request. The value is base64 encoded.
            • For HTTP POST, put the LogoutRequest or LogoutResponse in the request body of the SAML request.
            • For HTTP Redirect, put the deflated LogoutRequest or LogoutResponse in the query string of the SAML request.
          7. Provide the service provider with the Salesforce identity provider SLO endpoint for your Salesforce org. The service provider uses this endpoint to initiate SLO. The endpoint has the format https://MyDomainName.my.salesforce.com/services/auth/idp/saml2/logout where MyDomainName is your Salesforce domain.
            Single Logout for SAML SP endpoint
            If the org is an Experience Cloud site, the logout URL for the site appears on the same page.
           
          Loading
          Salesforce Help | Article