- Getting started
- Data security and compliance
- Organizations
- Authentication and security
- Understanding authentication models
- Configuring the Microsoft Entra ID integration
- Setting up SAML SSO with Microsoft Entra ID
- Setting up Okta as your identity provider
- Setting up PingOne as your identity provider
- Managing UiPath signing certificate for SAML authentication requests
- Local users password complexity requirements
- Licensing
- Tenants and services
- Accounts and roles
- External applications
- Testing in your organization
- AI Trust Layer
- Notifications
- Logging
- Troubleshooting

Automation Cloud Public Sector admin guide
In the SAML protocol, the service provider (SP) can sign authentication requests to confirm their origin and ensure they are not changed during transmission. The SP uses a private key (signing certificate) to sign the request. The identity provider (IdP) uses the matching public key (signing certificate) to validate the signature.
By default, UiPath signs SAML authentication requests using its own certificate. UiPath frequently changes this certificate. If your IdP cannot automatically retrieve the updated certificate from UiPath's SAML metadata URL, you must manually upload the new certificate in your IdP each time it changes. This manual process increases the risk of errors and service interruption.
To reduce this effort, you can use UiPath's SAML certificate API endpoints to upload your own signing certificate. This allows you to manage the signing certificate through automation. After you upload a new certificate, you must also update the matching public key in your IdP to maintain a valid connection and follow your organization's security policies.
When you upload a customer certificate, UiPath replaces the default certificate in the SAML metadata document. UiPath then uses your certificate for all signing actions. After you upload the certificate, update the matching public key in your IdP to follow your organization's IT security and compliance policies
Before you upload your own signing certificate for the SAML integration, make sure you take the following aspects into consideration:
- You are responsible for ensuring that you renew your uploaded self-signed certificates before they expire.
- Uploading a new certificate in UiPath will override the existing certificate in the UiPath SAML metadata document, and also the one uploaded in your IdP.
Before you upload your own signing certificate for the SAML integration, make sure you meet the following requirements:
- You must configure a SAML integration for your organization.
- You need access to your
organization's
partitionGlobalId.partitionGlobalIdis the organization ID. - You must generate a certificate that includes a private key in PEM format.
- The PEM file must include both the certificate and the private key.
- You must upload the public certificate to your IdP (for example, PingOne) after you upload it to your UiPath organization.
- To upload a secondary certificate, you must first upload a primary certificate.
To generate a custom signing certificate and uploading it to UiPath's Identity Server, for your existing SAML integrations, follow these steps:
- Generate a self-signed
certificate.
For example, use the following OpenSSL powershell commands to generate a self-signed certificate valid for one year:
openssl req -x509 -newkey rsa:2048 -nodes -keyout key.pem -out cert.pem -days 365 -subj "/CN=example.com" Get-Content key.pem, cert.pem | Set-Content full-cert.pemopenssl req -x509 -newkey rsa:2048 -nodes -keyout key.pem -out cert.pem -days 365 -subj "/CN=example.com" Get-Content key.pem, cert.pem | Set-Content full-cert.pemThese commands create the following objects:key.pem– private keycert.pem– certificatefull-cert.pm– combined PEM with private key and certificate
- Upload your primary certificate
using the
PUT /https://govcloud.uipath.us/{organizationName}/identity_/SamlCertificate/primaryAPI.Note: The certificate becomes the primary signing certificate for your organization.Response example:{ "partitionGlobalId": "GUID", "primaryCertificateId": int, "primaryCertificateThumbprint": "string", "secondaryCertificateId": null, "secondaryCertificateThumbprint": null }{ "partitionGlobalId": "GUID", "primaryCertificateId": int, "primaryCertificateThumbprint": "string", "secondaryCertificateId": null, "secondaryCertificateThumbprint": null } - (Optional) Upload a secondary
certificate using the
PUT /https://govcloud.uipath.us/{organizationName}/identity_/SamlCertificate/secondaryAPI:To minimize disruption during certificate rotation, the SAML protocol allows the IdP to validate the signature against any certificate published in the service provider's metadata. This enables you to:- Create a new signing certificate.
- Upload it to your IdP as a verification certificate.
- Switch the secondary certificate to primary.
- Delete the old primary certificate.
Response example{ "partitionGlobalId": "GUID", "primaryCertificateId": int, "primaryCertificateThumbprint": "string", "secondaryCertificateId": int, "secondaryCertificateThumbprint": "string" }{ "partitionGlobalId": "GUID", "primaryCertificateId": int, "primaryCertificateThumbprint": "string", "secondaryCertificateId": int, "secondaryCertificateThumbprint": "string" } - (Optional) Switch the secondary
certificate to primary, using the
POST /https://govcloud.uipath.us/{organizationName}/identity_/SamlCertificate/switchAPI:Switching certificates ensures a seamless certificate replacement or renewal.
Response example{ "partitionGlobalId": "<Id>", "primaryCertificateId": 74268, "primaryCertificateThumbprint": "<Id>", "secondaryCertificateId": <Id>, "secondaryCertificateThumbprint": "<Id>" }{ "partitionGlobalId": "<Id>", "primaryCertificateId": 74268, "primaryCertificateThumbprint": "<Id>", "secondaryCertificateId": <Id>, "secondaryCertificateThumbprint": "<Id>" } - (Optional) Verify which
certificates are currently configured for your organization using the
GET /https://govcloud.uipath.us/{organizationName}/identity_/SamlCertificate/{partitionGlobalId}/certificatesAPI.This returns the current primary and secondary certificate IDs and thumbprints.
This step helps you verify your certificate setup to ensure the right certificate is currently active.
- (Optional) Delete a certificate
using the
DELETE /https://govcloud.uipath.us/{organizationName}/identity_/SamlCertificate/{partitionGlobalId}/{certificateId}API.Deleting old or unused certificates reduces potential security risks.
Note: You cannot delete the primary certificate if a secondary certificate is still present.