Relyra is a strict-by-default SAML 2.0 Service Provider library for Elixir and Phoenix. It is for teams that need enterprise SSO without becoming SAML experts.
Start Here
Use one Day-1 route:
- Install the library and scaffold the host app with
mix relyra.install. - Follow Getting Started.
- Prove a local sign-in with
Relyra.TestSupport.FakeIdP. - Choose exactly one first-class provider runbook.
- Return to the production follow-ons after the first provider is working.
The README is the router. The full onboarding narrative lives in guides/getting_started.md.
Batteries Included Support
First-class batteries-included support is limited to:
- Okta
- Microsoft Entra ID
- Google Workspace
In this repo, "batteries included" means the provider has a shipped preset module, a repo-native runbook, provider-specific field vocabulary, and Day-1 guidance that ends in a concrete receipt.
Use these runbooks only after you complete the local FakeIdP proof in Getting Started:
Custom SAML And Not-Yet-Shipped Providers
- Custom SAML: Supported as a generic integration path when you bring your own IdP-specific field mapping and operator verification. Start from the canonical onboarding flow, then adapt it to your provider's metadata and claim vocabulary.
- Not yet shipped: Any provider without a shipped preset module and verified runbook is not first-class batteries included support.
Relyra does not claim batteries-included support for providers outside Okta, Microsoft Entra ID, and Google Workspace.
What Ships In The Library
- Strict SP-initiated login and ACS validation.
- Hardened XML, signature, and protocol checks.
- Provider presets for Okta, Microsoft Entra ID, and Google Workspace.
Relyra.TestSupportandRelyra.TestSupport.FakeIdPfor local proof.mix relyra.installfor minimal host-app scaffolding.- Optional LiveAdmin, metadata lifecycle, certificate lifecycle, telemetry, audit seams, scheduled refresh, and diagnostic surfaces for later-stage operator workflows.
What Does Not Ship
- OIDC or OAuth flows.
- A hosted broker runtime.
- SCIM lifecycle ownership.
- First-class batteries-included support for providers beyond Okta, Microsoft Entra ID, and Google Workspace.
Day-2 And Operator Guides
These surfaces matter after Day-1, but they should not compete with onboarding:
- Getting Started for the canonical Day-1 path.
- Security policy for supported algorithms, disclosure, and release posture.
- Security review packet for auditors and release review.
LiveAdmin is optional. Metadata refresh, certificate rollover, audit review, telemetry wiring, and diagnostic bundles belong after the first successful provider login, not before it.