Before Importing and validation, the prerequisites need to be satisfied again.
Note: When validating SAML settings, some browsers may not show all errors correctly. If SAML verification/validation does not seem to work under Chrome (for example), try again using Firefox.
Import
Google App Configuration - Click on the Select File button to browse the IDP metadata that you downloaded while configuring the Google App and upload it or paste the values you copied out of the Application configuration from https://admin.google.com/. If the import is successful, the page will automatically fill in the values.
Warning! The Issuer field is not really read in from the configuration. This value is calculated to be compatible with Google SAML Id Provider and others. Your SAML Id may require a different value for Issuer.
Note: If the Metadata can not be read you’ll have to enter the SAML URL and Certificate yourself. If you lost the values you can always find these values again in your google app. Select “Service Provider Details”.
Click on the Manage Certificates
OneLogin Configuration
Click on the Select File button to browse onelogin_metadata_XXXXXXX.xml file that you downloaded while configuring OneLogin and upload it, thus importing the configuration into Wasp Cloud.
If you copied the other values, simply verify the SAML URL and Certificate with values you saved in the previous steps.
ADFS Configuration
Click on the Select File button to browse the Metadata file downloaded from the ADFS Server and upload it.
If validation fails,
If Signature fails,