updated sso
diff --git a/defaults/main.yml b/defaults/main.yml
index a5bde60..0e3b346 100644
--- a/defaults/main.yml
+++ b/defaults/main.yml
@@ -11,14 +11,14 @@
 jwt_key_size: 2048
 
 saml_folder: "{{ apigee_home }}/customer/application/apigee-sso/saml"
-sso_saml_service_provider_key_filename: server.key
-sso_saml_service_provider_key: "{{ saml_folder }}/{{ sso_saml_service_provider_key_filename}}"
+sso_saml_service_provider_key_file_name: server.key
+sso_saml_service_provider_key_file_path: "{{ saml_folder }}/{{ sso_saml_service_provider_key_file_name }}"
 saml_private_encryption_type: aes256
 saml_private_key_size: 1024
 saml_cert_signing_request_file_name: server.csr
 saml_cert_signing_request: "{{ saml_folder }}/{{ saml_cert_signing_request_file_name }}"
-sso_saml_service_provider_certificate_filename: server.crt
-sso_saml_service_provider_certificate: "{{ saml_folder }}/{{ sso_saml_service_provider_certificate_filename }}"
+sso_saml_service_provider_certificate_file_name: server.crt
+sso_saml_service_provider_certificate_file_path: "{{ saml_folder }}/{{ sso_saml_service_provider_certificate_file_name }}"
 saml_cert_encryption_type: sha256
 saml_cert_expiry_days: 365
 saml_cert_subject: "/C=US/O=google/OU=apigee/CN=apigee.com"
diff --git a/tasks/create-saml-keys-cert.yml b/tasks/create-saml-keys-cert.yml
index 3459ae0..9732cd3 100644
--- a/tasks/create-saml-keys-cert.yml
+++ b/tasks/create-saml-keys-cert.yml
@@ -1,7 +1,7 @@
 ---
 - name: Assert that service provider key file exists
   stat:
-    path: "{{ sso_saml_service_provider_key_filename}}"
+    path: "{{ sso_saml_service_provider_key_file_path }}"
   register: key
 
 - block:
@@ -19,7 +19,7 @@
     register: passphrase
 
   - name: Generate your private key with a passphrase
-    command: "openssl genrsa -{{ saml_private_encryption_type }} -passout pass:{{ passphrase.stdout }} -out {{ sso_saml_service_provider_key_filename}} {{ saml_private_key_size }}"
+    command: "openssl genrsa -{{ saml_private_encryption_type }} -passout pass:{{ passphrase.stdout }} -out {{ sso_saml_service_provider_key_file_name}} {{ saml_private_key_size }}"
     args:
       chdir: "{{ saml_folder }}"
 
@@ -29,8 +29,8 @@
 #
 #  - name: Generate your private key with a passphrase
 #    openssl_certificate:
-#      path: "{{ sso_saml_service_provider_certificate_filename }}"
-#      privatekey_path: "{{ sso_saml_service_provider_key_filename }}"
+#      path: "{{ sso_saml_service_provider_certificate_file_name }}"
+#      privatekey_path: "{{ sso_saml_service_provider_key_filepath }}"
 #      csr_path: "{{ saml_cert_signing_request_file_name }}"
 #      provider: selfsigned
 #      subject: "{{ saml_cert_subject }}"
@@ -39,27 +39,27 @@
 
   - name: Prep to remove passphrase from Key
     copy:
-      dest: "{{ saml_folder }}/remove-passphrase-{{ sso_saml_service_provider_key_filename}}"
-      src: "{{ saml_folder }}/{{ sso_saml_service_provider_key_filename}}"
+      dest: "{{ saml_folder }}/remove-passphrase-{{ sso_saml_service_provider_key_file_name}}"
+      src: "{{ sso_saml_service_provider_key_filepath}}"
       remote_src: yes
 
   - name: Remove the passphrase from the key
-    shell: "openssl rsa -in remove-passphrase-{{ sso_saml_service_provider_key_filename}} -passin pass:{{ passphrase.stdout }} -out {{ sso_saml_service_provider_key_filename}}"
+    shell: "openssl rsa -in remove-passphrase-{{ sso_saml_service_provider_key_file_name}} -passin pass:{{ passphrase.stdout }} -out {{ sso_saml_service_provider_key_file_name}}"
     args:
       chdir: "{{ saml_folder }}"
 
   - name: Clean up passphrase removal file
     file:
-      path: "{{ saml_folder }}/remove-passphrase-{{ sso_saml_service_provider_key_filename}}"
+      path: "{{ saml_folder }}/remove-passphrase-{{ sso_saml_service_provider_key_file_name}}"
       state: absent
 
   - name: Generate certificate signing request for CA
-    shell: "openssl req -x509 -sha256 -new -passin pass:{{ passphrase.stdout }}  -key {{ sso_saml_service_provider_key_filename}} -out {{ saml_cert_signing_request_file_name }} -subj {{ saml_cert_subject }}"
+    shell: "openssl req -x509 -sha256 -new -passin pass:{{ passphrase.stdout }}  -key {{ sso_saml_service_provider_key_file_name}} -out {{ saml_cert_signing_request_file_name }} -subj {{ saml_cert_subject }}"
     args:
       chdir: "{{ saml_folder }}"
 
   - name: Generate self-signed certificate with 365 days expiry-time
-    shell: "openssl x509 -{{ saml_cert_encryption_type }} -days {{ saml_cert_expiry_days }} -in {{ saml_cert_signing_request_file_name }} -signkey {{ sso_saml_service_provider_key_filename}} -out {{ sso_saml_service_provider_certificate_filename }}"
+    shell: "openssl x509 -{{ saml_cert_encryption_type }} -days {{ saml_cert_expiry_days }} -in {{ saml_cert_signing_request_file_name }} -signkey {{ sso_saml_service_provider_key_file_name}} -out {{ sso_saml_service_provider_certificate_file_name }}"
     args:
       chdir: "{{ saml_folder }}"
 
diff --git a/tasks/main.yml b/tasks/main.yml
index 90645b9..ce85294 100644
--- a/tasks/main.yml
+++ b/tasks/main.yml
@@ -14,7 +14,7 @@
   with_items:
   - { key: 'sso_jwt_signinig_key_filepath', value: '{{ sso_jwt_signinig_key_filepath }}' }
   - { key: 'sso_saml_service_provider_key', value: '{{ sso_saml_service_provider_key }}' }
-  - { key: 'sso_saml_service_provider_certificate', value: '{{ sso_saml_service_provider_certificate }}' }
+  - { key: 'sso_saml_service_provider_certificate', value: '{{ sso_saml_service_provider_certificate_file_path}}' }
   - { key: 'edge_sso_installation_config_filename' , value: '{{ edge_sso_installation_config_filename }}' }
   - { key: 'edge_sso_installation_config_file', value: "{{ edge_sso_installation_config_file }}" }
   - { key: 'saml_folder', value: "{{ saml_folder }}" }