Here is your SAML2 assertion for EPR INT Emedo Egger. You can now get a XUA assertion with the Get-X-User-Assertion transaction in your EPR community.
Back to home.
XML inspector
Please be aware that reformatting the assertion makes the signature invalid. Don't try to use this one.
<saml2:Assertion xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" ID="Assertion_05554a37-bdcd-4308-a355-4afb9f43e157" IssueInstant="2026-05-23T17:42:34.902Z" Version="2.0">
<saml2:Issuer>urn:oid:2.16.756.5.30.1.999.9.1.1.1</saml2:Issuer>
<ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
<ds:SignedInfo>
<ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
<ds:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/>
<ds:Reference URI="#Assertion_05554a37-bdcd-4308-a355-4afb9f43e157">
<ds:Transforms>
<ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/>
<ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
</ds:Transforms>
<ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/>
<ds:DigestValue>c0777gxoB+Fohf30xvR7IyBGuJMzbjGx3lczHZxfzBo=</ds:DigestValue>
</ds:Reference>
</ds:SignedInfo>
<ds:SignatureValue>
RMkXJwTzdf4urCxCSU9nQO9Ae9MkfqGRO4KdlPnYspqv3zdOe9rJ51DHXFFIOFfYd8PitpOQU2yM
Dr0//X5N0SpECNkCtP1vfe8lPxvA82NE8Mmp4psTw/yC+aH8K+adStJvY4vbP5HkoEuY8SF328Uz
yZXPYscIwEZIynRPlNtLpEYmFuRGR856DbXso6yeld+rjgk6kPv2nQa6TVTRBF/wgzvH/7KkHYhY
HnVLDpI/eR8XJVRzQGmlyvGXO0vmgODiw2MCJNx1bI3P6vmiYW06uWQIyLEX1tQaBvZs3eiaTFpQ
76g/ps8Ta4WssSjxMFNlp6/WqGaAqLlNw6da851HUtsb86LtR/7KbdYxleAdi087cVwj7eDYbHZF
y0xNE0KkNXQZ9RajsS4Vr9uuCBuxfu1L0ayRpwUBRGZ1zxpUhWF2g38JVzPhgJyDwrOD7cRBTOuU
ZzxCFYS2YTRX02oknys6Nfz+3kiQPbdl+zVos0l++a7UwP3TRApMk1vd
</ds:SignatureValue>
<ds:KeyInfo>
<ds:X509Data>
<ds:X509Certificate>MIIF+TCCBOGgAwIBAgIQBtAkev63sDIhs3qFzd7OMTANBgkqhkiG9w0BAQsFADBTMQswCQYDVQQG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</ds:X509Certificate>
</ds:X509Data>
</ds:KeyInfo>
</ds:Signature>
<saml2:Subject>
<saml2:NameID Format="urn:oasis:names:tc:SAML:2.0:nameid-format:persistent">2.16.756.5.30.1.999.9.1.1.1</saml2:NameID>
<saml2:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"/>
</saml2:Subject>
<saml2:Conditions NotBefore="2026-05-23T17:42:34.902Z" NotOnOrAfter="2026-05-23T17:52:34.902Z"/>
<saml2:AuthnStatement AuthnInstant="2026-05-23T17:42:34.902Z" SessionNotOnOrAfter="2026-05-23T17:52:34.902Z">
<saml2:AuthnContext>
<saml2:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified</saml2:AuthnContextClassRef>
</saml2:AuthnContext>
</saml2:AuthnStatement>
</saml2:Assertion>
How to use
There are two ways to more easily consume this SAML assertion.
-
You can specify the header
Accept: application/xmlwhen requesting this page (GET /tcu/epr_int_emedo_egger) to receive the assertion XML directly, instead of an HTML page. - You can specify the header
ikit-inject-tcu-token: epr_int_emedo_eggerin your requests to the IKIT, and it will automatically fetch and inject this SAML assertion before sending your request to its recipient.