How to bypass OIDC Tenant banner when metadata endpoint is used

Dear experts,

From this article I understand that you have to set the connection request parameter to the main tenant’s name if you want to bypass the oidc tenant banner during the authentication process in the subtenant. However I am still unsure how this should work for a service provider (in my case SAML) using an online metadata endpoint url to retrieve the SingleSignOnService URL (or in case of OIDC the well-known endpoint to get the authorization URL). Is there any way on IdP (Auth0) side to get the SingleSignOnService URL built properly including the connection request parameter?

Thanks and br,
Elmar