SAML Enabling Your Application
If your application is COTS or GOTS the first step would be to determine whether your application supports SAML or any other form of federation by checking the vendor documentation, contacting the vendor, or searching the web for SAML module support or integration. If your application is “homegrown” software, then in order to SAML enable your application, you will need to search the web for a SAML toolkit or SAML libraries written in the same language as your software. While many other options exist, some sample SAML code libraries are included below for your convenience:
Apache Server
A slightly less tightly integrated SAML alternative can also be implemented on some web servers such as Apache, rather than at the application level. There is a module name "mod auth mellon" which enables SAML on Apache servers. It is also available in the RHEL 7 repositories. The advantage of this Apache module is that it does not require any code modifications and at the same time it enables you to protect different locations/URLs using group membership as an LDAP attribute sent from Identity Provider (IdP) / Access Manager.
IIS Server
In order to SAML enable an IIS server, a third party module named "Shibboleth" can be used. Shibboleth is an open-source project that provides Single Sign-On capabilities and allows sites to make informed authorization decisions for individual access of protected online resources in a privacy-preserving manner.
http://www.testshib.org
Generating Matadata for Integration.
If you are using the Apache mod auth mellon module then you will execute the “mellon_create_metadata.sh” to export your metadata.
If you are generating the metadata manually (ex. “homegrown” application) you may want to use the following site to generate your metadata: https://www.samltool.com/sp_metadata.php
Verifying Signature url
You can use below website to verify meta data signature.
https://www.samltool.com/sign_authn.php