Choose persistent or transient federation
In Identity Cloud, there are two ways to federate users with SAML 2.0:
Permanently link identities with persistent federation.
Persistent federation requires an attribute value that is the same on the IDP and the SP; for example, an email address or another unique user identifier. Use this method to link accounts without user interaction.
For more information, refer to Link identities automatically based on an attribute value.
When accounts are persistently linked, authentication is required only by the IDP. Authentication is required on the SP side if the SP is unable to map the identity in the assertion from the IDP to a local user account. This can happen the first time accounts are linked, for example, after which the persistent identifier establishes the mapping. When the mapping is established, authentication is required only by the IDP.
Maintain no user account on the SP with transient federation.
Transient federation can be useful when the SP needs no user-specific account to provide a service or when you do not want to retain a user profile on the SP, but you make authorization decisions based on attribute values from the IDP.
When accounts are transiently linked, authentication to the SP might be required.
The SP must authenticate the user for every SAML assertion received. This is due to the identifier being used to link identities in a transient way. It doesn’t provide a repeatable, durable means to link the identities.
You can prevent the ability to link accounts persistently.
For an SP, set the
For an IDP, set the