{"id":50634,"date":"2021-02-01T15:01:47","date_gmt":"2021-02-01T15:01:47","guid":{"rendered":"http:\/\/35.232.100.111\/?post_type=post&p=28113"},"modified":"2022-12-29T12:16:44","modified_gmt":"2022-12-29T12:16:44","slug":"saml-authentication","status":"publish","type":"post","link":"https:\/\/sectona.com\/pam-101\/authentication\/saml-authentication\/","title":{"rendered":"SAML Authentication Explained: Why is it used?"},"content":{"rendered":"\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\n\t\t\t\t\r\n\r\n\r\n\r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n \r\n <\/g>\r\n<\/svg>\r\n\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\t\t\t
\n\t\t\t\t

\n\t\t\t\t\t\n\t\t\t\t\t\tSAML Authentication\t\t\t\t\t<\/span>\n\t\t\t\t<\/h1>\n\t\t\t\t\t\t\t\t\t

\n\t\t\t\t\t\tAuthenticating a user through a single directory source\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\tExplore Platform<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t

What is SAML Authentication?<\/h2>\nSAML abbreviated for Security Assertion Markup Language is an XML-Based open standard for transferring identity related information between an Identity Provider and Service Provider. It simplifies and centralizes the authentication process, by authenticating a user once and communicating the identity claims to other external applications whenever a user requests access to them.\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t

Why do we Need SAML Authentication?<\/h2>

Service Providers around the world have started focusing on specialized web-based services that will cut costs, focus on user specific applications, and reduce complexity of maintaining and supporting the applications of an organization. Most organizations have started adopting a centralized authentication system for all their internal applications as well as web-based portals. This centralized authentication process enables strong security by preventing users from storing passwords for different systems on a sticky note.


But, as most of the services are from External Service Providers, it would give rise to the sticky note problem and create problems for the external service providers. \u202fUsers must remember passwords for different services like CRM, Payroll, Travel Agency Software leading to complexity of managing and maintaining user or programmer defined hardcoded SSO code of each of the external service provider in use.


Furthermore, as every user is mandated to set up the applications, a duplicate set of data gets created. Instead, if the organization controls the user data, it will save the service provider time to set up and terminate sessions on a regular basis while having an accurate source of user identity.


Given the set of problems for both organizations and service providers, a standard was needed for exchanging user authentication information to be exchanged over the internet between an Identity Provider and a Service Provider. That is how SAML, an XML based open standard came into picture allowing transmission of custom data to external service provider.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t

How does SAML Authentication work? <\/h2>\nSAML is an XML based Framework allowing for authentication and authorisation from Single Sign-On point of view. It has 3 roles involved in a transaction namely an asserting party, a relying party, and a subject. The Asserting Party is the identity provider that provides the user information, a Relying Party is the Service Provider that trusts the Asserting Party and uses the user information to provide him access to the application and the Subject involved in the transaction is the user. SAML 2.0 is the latest revision of this framework.\n<\/br><\/br>\nConsider a system that acts as an identity provider and a user who wants to log in to a remote application, such as an accounting or support application (service provider). Here\u2019s what happens: <\/br><\/br>\n
    \n
  1. The user, using a link on an intranet or a bookmark, accesses the remote application, and the application loads. \n<\/li>\n
  2. The user’s origin is identified by the application (by user IP address, application subdomain, or similar). The application asks for authentication by redirecting the user back to the identity provider. This is the authentication request. <\/li>\n
  3. The user may already have an active browser session with the identity provider or may establish one by logging in. \n<\/li>\n
  4. An authentication response containing the user\u2019s username or email address is built by the identity provider in the form of an XML document. It is signed with an X.509 certificate. The identity provider then sends this information to the service provider.<\/li> \n
  5. The service provider, which has a certificate fingerprint and is already familiar with the identity provider, retrieves the response and validates it using the certificate fingerprint.<\/li> \n
  6. The user\u2019s identity is established, and he\/she is granted app access. <\/li>\n<\/ol> \t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
    \n\t\t\t\t
    \n\t\t\t\t\t\t\t\t
    \n\t\t\t\t

    What are the Benefits of SAML Authentication?<\/h2>