My slides from the Identity Protocol Smackdown session at Gartner Catalyst 2013. Ignite format - 20 slides, 15 seconds per slide. There are auto-builds on a few slides, so download and view in
My slides from the Identity Protocol Smackdown session at Gartner Catalyst 2013. Ignite format - 20 slides, 15 seconds per slide. There are auto-builds on a few slides, so download and view in PowerPoint for the best experience.
But Salesforce Identity doesn’t just make our user’s lives simpler. Salesforce Identity delivers the same ease of deploying and managing force.com applications to any app.Now, Admins can use their most trusted cloud to centrally control access to any of their apps. Simply setup your app, assign permissions, and with single click you can make it available to the users that need access. Let’s take a look at the major piecesSingle Sign-OnUsers sign in once to salesforce, and gain one click access to applications. The Identity enabled Chatter feed allows deeply integrated applications to push important information to the user, or even access the app directly from the feedIdentity & Access ManagementAdministrators centrally manage access to applications, be those web, mobile or tablet. Management of users across applications and clouds is automated through highly flexible provisioning workflows. When users leave your company, you’re assured they’re properly removed with automated de-provisioning.Centralized ReportingGain transparency, insight, and piece of mind with centralized reports over user authentication, access, utilization, and de-provisioningEnterprise Directory IntegrationAnd, if you want to leverage your existing systems like Active Directory, we have best of breed integration capabilities built on open standards
The Universal Identity Solvent
Principal Developer Evangelist
Standardized by OASIS, March 2005
– Google Apps since October 2006
– salesforce.com since Winter ’09 (October 2008)
– Microsoft Active Directory Federation Services (AD
FS) since version 2.0 (May 2010)
– Your favorite service provider!
–Provides some service/resource to user
–Trusts identity provider to authenticate user
–User logs in here
–Creates SAML Assertion
Bring your own Identity single sign-on and
secure single sign-on
and social apps
SAML 2.0 Protocol
Identity Provider Service Provider
HTTP/1.1 302 Found
SAML Assertion in HTML FORM POST /acs
HTTP/1.1 302 Found
Set-Cookie: token=value; Domain=.ex.net
More than just Single Sign-On!
Can send any number of additional attributes
Can even provision identities!
– Service Provider creates account if one does not
already exist, gives user immediate access
– Service Provider updates account details with
– Sweet spot: large pool of potential users, small
number of actual users
SAML is Multi-Purpose!
• Single Sign-On
• But that’s not all!
• Loose coupling between identity protocols
allows us to use SAML in an OAuth flow
My Company Inc
Other Protocols in SAML
• ‘Authenticate’ user step can be anything
• Username/password (ugh!) still most common
• Any web-based interaction
– e.g. two factor
• Wrap any protocol in HTTP
– e.g. Kerberos -> SPNEGO
So SAML is Composable
But wait… That’s still not all!!!
The SAML Assertion is a
Universal Identity Solvent!
use SAML Assertion as
a token format!
• Authorization Services can function as
• Client app obtains SAML Assertion from
enterprise IAM infrastructure
• Authorization Service verifies Assertion, issues
token for API access
• Client app is off to the races
Bridging to the Brave New World
IETF Draft: SAML 2.0 Profile for OAuth 2.0 Client
Authentication and Authorization Grants
SAML -> OAuth -> Any API!
Enterprise apps get to play
– OpenID Connect
– Cloud Services
– Whatever you want
SAML and XACML
• SAML 2.0 Profile for XACML
• SAML as transport for XACML
Not only can SAML do SSO and
It can also interoperate with
ALL of the other identity
protocols on stage?