SlideShare a Scribd company logo
1 of 20
Download to read offline
SAML AS AN SSO STANDARD FOR
CUSTOMER IDENTITY MANAGEMENT
How to Create a Frictionless, Secure Customer Identity Management Strategy
PART 1: WHAT IS SAML?
GIGYA.COM | 3
SAML in Context
Security Assertion Markup Language (SAML) is an Extensible Markup Language (XML) standard that enables
secure websites and services to exchange user authentication data. SAML-based single sign-on (SSO)
standards are designed to create frictionless identity verification and management processes between
separate yet affiliated systems.
Dating back to 2001, SAML has evolved to support a range of identity federation and management needs.
Some of today’s most popular third-party web applications such as Google Apps, Zendesk, and Salesforce use
SAML to authenticate users.
The end goals? Simplify data management. Streamline user flows. Keep customers engaged with your
company.
54 percent of companies have difficulty managing and integrating data from today’s many
varied sources, while 50 percent are concerned about consistent data quality (Destination
CRM).
GIGYA.COM | 4
SAML has developed a reputation as a solution for employee management for IT teams within nonprofit,
government, small business, and enterprise organizations. Internally, organizations use SAML as an SSO
service to manage employee, partner and contractor access to network-based applications.
But the applications of SAML extend much further.
Exploring Use Cases
Within the past 5-10 years, the rise of ecommerce, social 

networks, mobile and connected devices has created 

the need for businesses to develop an external identity 

access management (IAM) strategy to keep up 

with the flood of identity data being created as 

customers connect across channels.
GIGYA.COM | 5
Where SAML stands out from other authentication mechanisms is that it allows businesses to identify
who users are and communicate information about them. Businesses can add structure to disparate
user data to tell a rich, compelling story about each user profile.
Below is a hypothetical example for how a membership-only television site can use SAML to better
understand and track their customers.
How SAML Stands Out
SAML: Authorization & Authentication Other Authentication Standards for Enterprise SSO
Name: Emily Smith
Job Title: Manager at tech company
Gender: Female
Level of Membership: Platinum
Date Joined: 2009
Interest 1: Travel
Interest 2: Documentaries
Interest 3: Stand Up Comedy
User has permission to access features: Yes
Name: Emily Smith
Email Address: emilysmith@testemail.com
GIGYA.COM | 6
Enterprise organizations rely on
multiple service providers -- such
as customer support and payment
processing software -- to support
core user experience goals.
Companies will also often team up,
through strategic partnership
initiatives, to introduce new
products and services to shared
customer bases.
SAML in Action
SAML creates a structured, secure, and scalable process
to integrate data between these web applications and
authentication processes.
GIGYA.COM | 7
Comcast XFINITY customers can stream content online. Comcast uses SAML to authenticate users,
and then to provide authorization information regarding whether the user's subscription includes
access to Discovery's online video content.
Example: Video Subscription Product
PART 2: THE TECHNOLOGY
GIGYA.COM | 9
Think of SAML as a “handshake with an upgrade.” SAML uses something called an assertion
document -- an XML file that connects pieces of information -- between a service provider and an
identity provider. In contrast, other standards provide identity management using only strings of text,
which allow for only a very basic handshake.
SAML’s assertion document is more elaborate and more structured than other standards, making it an
ideal identity management solution for enterprise organizations. SAML (1) identifies the user and (2)
communicates predefined characteristics about that user. OAuth, in contrast, communicates only an
access token, or alpha-numeric string, which can be used to obtain information about the user, but
does not provide that information directly.
How SAML Works
If you want to create
an elaborate user
profile, you need to
go with SAML.
Image Source:
Salesforce
GIGYA.COM | 10
The three SAML components include
assertions, protocol, and binding.
An assertion is a package of information
related to user identity and security.
There are three types of SAML
assertions: authentication, attribute, and
authorization. Authentication assertion is
used to validate user identity, attribute
assertion contains information about the
user, and authorization assertion
identifies what the user can do.
Components of SAML
Type of Assertion Question Asked Example
Authentication Who is the user? The user is a valid user.
Attribute
What do we know about this
particular user?
The user is male, 34 years
old, lives in Nebraska and
subscribes to premium
channels such as HBO.
Authorization
Is the user authorized to
access this particular
membership area or website
feature?
Comcast subscriber who
pays for Discovery Channel
access can watch Discovery
Channel TV shows on
XFINITY
SAML protocol refers to how data gets transmitted from the sender to receiver. Sample binding
determines how SAML requests map to standard messaging and communications protocols.
SAML works with multiple protocols including Hypertext Transfer Protocol (HTTP) Simple Mail Transfer
Protocol (SMTP), and File Transfer Protocol (FTP). SAML also supports SOAP, BizTalk, and Electronic
Business XML (ebXML).
Assertion Examples from Membership Video Site:
GIGYA.COM | 11
SAML has a lot of moving parts -- it’s a complex topic that is challenging to grasp. We put together the
following ‘cheat sheet’ for you to quickly and consistently reference as needed.
SAML Cheat Sheet
GIGYA.COM | 12
GIGYA.COM | 13
This diagram explains how an example
service provider would verify users with an
identity provider.
SAML Visualized:
How It All Fits
Together
- User attempts to reach a hosted service or
application.
- The service or application generates a SAML
request, which is encoded and embedded into
the URL for the partner’s SSO service. A
parameter, set up as an identifier, is passed
back without any modification or inspection.
Image Source: Google
GIGYA.COM | 14
- The application sends a redirect to the user’s
browser, which includes the encoded SAML
authentication request that should be
submitted to the partner’s SSO service.
- The partner decodes the SAML request and
authenticates the user.
- The partner generates a SAML response that
contains the authenticated user's username. In
accordance with the SAML 2.0 specification,
this response is digitally signed with the
partner's public and private DSA/RSA keys.
SAML Visualized:
How It All Fits
Together
(cont’d)
Image Source: Google
PART 3:
THE BIG PICTURE -- IS SAML RIGHT FOR YOU?
GIGYA.COM | 16
Companies are collecting volumes of first-party data for product, marketing, business development,
and support initiatives. To be action-oriented in creating a high-impact user experience and making a
monetization plan, this data needs to be organized into a framework that supports scalable processes
-- to break down identity silos and create a consolidated customer profile.
Adding Structure to Data
SAML can help bind social and
other unstructured profile data with
internal profile data attributes via a
trusted connection. This structured
approach to organizing, analyzing,
and using data provides the input
to build predictive analytic
capabilities, web personalization
models, and marketing automation
systems.
Over 2.5 exabytes of data are created every single
day (HBR).
More than 90% of social media data is unstructured
(BusinessInsider).
90% of all the data in the world has been created in
the last two years (IBM).
GIGYA.COM | 17
Enterprise organizations are targets for security breaches that could
put them and their consumers at risk. Your identity management
strategy needs to create an extremely secure environment for your
businesses and your customers.
SAML requires both the IdP and relying party to register with one
another. The two sides exchange encryption keys and the SAML
request-response sequence can be signed and validated. This is the
most secure verification process available, as the two systems (1)
know about each other and are (2) talking to each other directly.
Addressing Security Risks
A solution like OpenID, for example, allows a relying party to request authentication from an IdP
without prior registration and is used for public authentication. It’s less secure than SAML.
For this reason, SAML is the ideal option for consumer-facing enterprise organizations and companies
-- like banks, for instance -- that are looking to engage in secure transactions.
GIGYA.COM | 18
SAML’s strongest benefit is also its biggest challenge.
SAML is much more elaborate than other solutions like OpenID and requires careful pre-planning -- it
is much more time consuming to implement than other solutions. You have to configure the sender
and the recipient and determine the data structure for your assertion document upfront.
The Balancing Act of Planning
The challenge with SAML is that, in order to make your system work, you have to configure your
endpoint configuration as well as the configuration of the sender and receiver. Your system needs to be
compatible with the SSO standard, and you’ll need an interface that accommodates your end users.
GIGYA.COM | 19
Gigya's Customer Identity Management Platform allows companies to collect, consolidate, and
manage first party customer data in the cloud, developing an end-to-end customer identity data
management strategy built for today’s variety of channels, devices and data.
With the ability to serve as a SAML service provider or identity provider, as well as function as the
service provider for social login and any OpenID identity provider, Gigya can help your business
choose and implement an SSO standard that meets your business goals.
Where Gigya Fits In
ABOUT GIGYA
Gigya's Customer Identity Management Platform helps companies build better customer relationships by turning
unknown visitors into known, loyal and engaged customers. With Gigya’s technology, businesses increase registrations
and identify customers across devices, consolidate data into rich customer profiles, and provide better service, products
and experiences by integrating data into marketing and service applications.
Gigya's platform was designed from the ground up for social identities, mobile devices, consumer privacy and modern
marketing. Gigya provides developers with the APIs they need to easily build and maintain secure and scalable
registration, authentication, profile management, data analytics and third-party integrations.
More than 700 of the world’s leading businesses such as Fox, Forbes, and Verizon rely on Gigya to build identity-driven
relationships and to provide scalable, secure Customer Identity Management.
For more details about Gigya, visit www.gigya.com.
© 2014 Gigya Incorporated. All rights reserved.
Gigya, the Gigya logo, and Customer Identity Management Platform are either registered trademarks or trademarks of Gigya Incorporated in
the United States and/or other countries. All other trademarks are the property of their respective owners.
Gigya does not own any end user data or maintain any other rights to this data, other than utilizing it to make Gigya's services available to our
clients and their end users. Gigya acts as an agent or back-end vendor of its client's website or mobile application, to which the end user of
our client granted permissions (if applicable). Gigya facilitates the collection, transfer and storage of end user data solely on behalf of its
clients and at its clients' direction. For more information, please see Gigya's Privacy Policy, available at http://www.gigya.com/privacy-policy/.
To learn how Gigya can help provide you with the tools and technology needed to develop a successful
SAML strategy, visit gigya.com, or call us at 888.660.1469.

More Related Content

What's hot

White Paper: Achieving A Single Customer View: The Holy Grail for Marketers
White Paper: Achieving A Single Customer View: The Holy Grail for MarketersWhite Paper: Achieving A Single Customer View: The Holy Grail for Marketers
White Paper: Achieving A Single Customer View: The Holy Grail for MarketersGigya
 
BEA_IT_cs1.290214856
BEA_IT_cs1.290214856BEA_IT_cs1.290214856
BEA_IT_cs1.290214856ypai
 
Metadata Melodies Webinar with David Loshin Presentation
Metadata Melodies Webinar with David Loshin PresentationMetadata Melodies Webinar with David Loshin Presentation
Metadata Melodies Webinar with David Loshin PresentationEmbarcadero Technologies
 
Data Sheet: IAM vs. CIAM: A Simple Choice
Data Sheet: IAM vs. CIAM: A Simple ChoiceData Sheet: IAM vs. CIAM: A Simple Choice
Data Sheet: IAM vs. CIAM: A Simple ChoiceGigya
 
IBM Mainframe Customers List
IBM Mainframe Customers List IBM Mainframe Customers List
IBM Mainframe Customers List LogiChannel Inc
 
Gartner magic quadrant_2017
Gartner magic quadrant_2017Gartner magic quadrant_2017
Gartner magic quadrant_2017Tim O'Leary
 
GigaTrust Investor Presentation 2010
GigaTrust Investor Presentation 2010GigaTrust Investor Presentation 2010
GigaTrust Investor Presentation 2010guest4a4bba7
 
E Marketer - Optimizing The E-commerce Experience
E Marketer - Optimizing The E-commerce ExperienceE Marketer - Optimizing The E-commerce Experience
E Marketer - Optimizing The E-commerce ExperienceLiveXtension
 
Whitepaper: Identity Relationship Management - Happiest Minds
Whitepaper: Identity Relationship Management - Happiest MindsWhitepaper: Identity Relationship Management - Happiest Minds
Whitepaper: Identity Relationship Management - Happiest MindsHappiest Minds Technologies
 
IBM Partner Engagement Manager
IBM Partner Engagement ManagerIBM Partner Engagement Manager
IBM Partner Engagement ManagerLightwell
 
RSA’s Federated Identity Solution for Milliman Single SignOn
RSA’s Federated Identity Solution for Milliman Single SignOnRSA’s Federated Identity Solution for Milliman Single SignOn
RSA’s Federated Identity Solution for Milliman Single SignOnCraig Burma
 
MavMLM_Brochure_English
MavMLM_Brochure_EnglishMavMLM_Brochure_English
MavMLM_Brochure_Englishadam webb
 
Citizen interaction and case management
Citizen interaction and case managementCitizen interaction and case management
Citizen interaction and case managementNerea
 
CDP in action - handling multiple data sources for smart activation - Benchma...
CDP in action - handling multiple data sources for smart activation - Benchma...CDP in action - handling multiple data sources for smart activation - Benchma...
CDP in action - handling multiple data sources for smart activation - Benchma...EBG
 
Content Assembly Mechanism Executive Overview
Content Assembly Mechanism Executive OverviewContent Assembly Mechanism Executive Overview
Content Assembly Mechanism Executive OverviewEd Dodds
 
E Commerce
E CommerceE Commerce
E Commercejroloff
 

What's hot (20)

White Paper: Achieving A Single Customer View: The Holy Grail for Marketers
White Paper: Achieving A Single Customer View: The Holy Grail for MarketersWhite Paper: Achieving A Single Customer View: The Holy Grail for Marketers
White Paper: Achieving A Single Customer View: The Holy Grail for Marketers
 
BUSINESS MANAGEMENT PROCESS
BUSINESS MANAGEMENT PROCESSBUSINESS MANAGEMENT PROCESS
BUSINESS MANAGEMENT PROCESS
 
BEA_IT_cs1.290214856
BEA_IT_cs1.290214856BEA_IT_cs1.290214856
BEA_IT_cs1.290214856
 
Metadata Melodies Webinar with David Loshin Presentation
Metadata Melodies Webinar with David Loshin PresentationMetadata Melodies Webinar with David Loshin Presentation
Metadata Melodies Webinar with David Loshin Presentation
 
Data Sheet: IAM vs. CIAM: A Simple Choice
Data Sheet: IAM vs. CIAM: A Simple ChoiceData Sheet: IAM vs. CIAM: A Simple Choice
Data Sheet: IAM vs. CIAM: A Simple Choice
 
Class 2
Class 2Class 2
Class 2
 
NAME's R&D Joint-Venture Services Contracts
NAME's R&D Joint-Venture Services ContractsNAME's R&D Joint-Venture Services Contracts
NAME's R&D Joint-Venture Services Contracts
 
IBM Mainframe Customers List
IBM Mainframe Customers List IBM Mainframe Customers List
IBM Mainframe Customers List
 
Gartner magic quadrant_2017
Gartner magic quadrant_2017Gartner magic quadrant_2017
Gartner magic quadrant_2017
 
GigaTrust Investor Presentation 2010
GigaTrust Investor Presentation 2010GigaTrust Investor Presentation 2010
GigaTrust Investor Presentation 2010
 
E Marketer - Optimizing The E-commerce Experience
E Marketer - Optimizing The E-commerce ExperienceE Marketer - Optimizing The E-commerce Experience
E Marketer - Optimizing The E-commerce Experience
 
Whitepaper: Identity Relationship Management - Happiest Minds
Whitepaper: Identity Relationship Management - Happiest MindsWhitepaper: Identity Relationship Management - Happiest Minds
Whitepaper: Identity Relationship Management - Happiest Minds
 
IBM Partner Engagement Manager
IBM Partner Engagement ManagerIBM Partner Engagement Manager
IBM Partner Engagement Manager
 
RSA’s Federated Identity Solution for Milliman Single SignOn
RSA’s Federated Identity Solution for Milliman Single SignOnRSA’s Federated Identity Solution for Milliman Single SignOn
RSA’s Federated Identity Solution for Milliman Single SignOn
 
MavMLM_Brochure_English
MavMLM_Brochure_EnglishMavMLM_Brochure_English
MavMLM_Brochure_English
 
Citizen interaction and case management
Citizen interaction and case managementCitizen interaction and case management
Citizen interaction and case management
 
CDP in action - handling multiple data sources for smart activation - Benchma...
CDP in action - handling multiple data sources for smart activation - Benchma...CDP in action - handling multiple data sources for smart activation - Benchma...
CDP in action - handling multiple data sources for smart activation - Benchma...
 
Goals Of E Business
Goals Of E BusinessGoals Of E Business
Goals Of E Business
 
Content Assembly Mechanism Executive Overview
Content Assembly Mechanism Executive OverviewContent Assembly Mechanism Executive Overview
Content Assembly Mechanism Executive Overview
 
E Commerce
E CommerceE Commerce
E Commerce
 

Viewers also liked

Shield UI Widget: Calendar
Shield UI Widget: CalendarShield UI Widget: Calendar
Shield UI Widget: CalendarJStoikov
 
HPU NCS2200 Air pollution part 2
HPU NCS2200 Air pollution part 2HPU NCS2200 Air pollution part 2
HPU NCS2200 Air pollution part 2cooperk2
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor NetworksAarthi Raghavendra
 
Shield UI Widget: Button
Shield UI Widget: ButtonShield UI Widget: Button
Shield UI Widget: ButtonJStoikov
 
Shield UI: Grid
Shield UI: GridShield UI: Grid
Shield UI: GridJStoikov
 
Shield UI Widget: Combo box
Shield UI Widget: Combo boxShield UI Widget: Combo box
Shield UI Widget: Combo boxJStoikov
 
Día del animal 1
Día del animal 1Día del animal 1
Día del animal 1bibileo
 
Automation wars. Made by Kateryna Vasylenko and Oleksandr Yatsenko
Automation wars. Made by Kateryna Vasylenko and Oleksandr YatsenkoAutomation wars. Made by Kateryna Vasylenko and Oleksandr Yatsenko
Automation wars. Made by Kateryna Vasylenko and Oleksandr YatsenkoKate Vasylenko
 
Shield UI Widget: Data picker
Shield UI Widget: Data pickerShield UI Widget: Data picker
Shield UI Widget: Data pickerJStoikov
 
Statement Of Results ITIL
Statement Of Results ITILStatement Of Results ITIL
Statement Of Results ITILMathew Ferris
 

Viewers also liked (12)

Shield UI Widget: Calendar
Shield UI Widget: CalendarShield UI Widget: Calendar
Shield UI Widget: Calendar
 
HPU NCS2200 Air pollution part 2
HPU NCS2200 Air pollution part 2HPU NCS2200 Air pollution part 2
HPU NCS2200 Air pollution part 2
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networks
 
Shield UI Widget: Button
Shield UI Widget: ButtonShield UI Widget: Button
Shield UI Widget: Button
 
Медиа кит "Жизнь в Турции"
Медиа кит "Жизнь в Турции" Медиа кит "Жизнь в Турции"
Медиа кит "Жизнь в Турции"
 
Shield UI: Grid
Shield UI: GridShield UI: Grid
Shield UI: Grid
 
базы данных викторина
базы данных викторинабазы данных викторина
базы данных викторина
 
Shield UI Widget: Combo box
Shield UI Widget: Combo boxShield UI Widget: Combo box
Shield UI Widget: Combo box
 
Día del animal 1
Día del animal 1Día del animal 1
Día del animal 1
 
Automation wars. Made by Kateryna Vasylenko and Oleksandr Yatsenko
Automation wars. Made by Kateryna Vasylenko and Oleksandr YatsenkoAutomation wars. Made by Kateryna Vasylenko and Oleksandr Yatsenko
Automation wars. Made by Kateryna Vasylenko and Oleksandr Yatsenko
 
Shield UI Widget: Data picker
Shield UI Widget: Data pickerShield UI Widget: Data picker
Shield UI Widget: Data picker
 
Statement Of Results ITIL
Statement Of Results ITILStatement Of Results ITIL
Statement Of Results ITIL
 

Similar to Wp saml v2_rs_3_24_2015

White Paper: DIY vs CIAM
White Paper: DIY vs CIAMWhite Paper: DIY vs CIAM
White Paper: DIY vs CIAMGigya
 
SAML Executive Overview
SAML Executive OverviewSAML Executive Overview
SAML Executive OverviewPortalGuard
 
Data Sheet: Why Your eCommerce Platform Needs CIAM
Data Sheet: Why Your eCommerce Platform Needs CIAMData Sheet: Why Your eCommerce Platform Needs CIAM
Data Sheet: Why Your eCommerce Platform Needs CIAMGigya
 
Implementing information federation
Implementing information federationImplementing information federation
Implementing information federationCory Casanave
 
Week 4 power point slide -1-case study 1-customer relationship....salesforce
Week 4  power point slide -1-case study 1-customer relationship....salesforceWeek 4  power point slide -1-case study 1-customer relationship....salesforce
Week 4 power point slide -1-case study 1-customer relationship....salesforceZulkifflee Sofee
 
Week 4 power point slide -1-case study 1-customer relationship....salesforce
Week 4  power point slide -1-case study 1-customer relationship....salesforceWeek 4  power point slide -1-case study 1-customer relationship....salesforce
Week 4 power point slide -1-case study 1-customer relationship....salesforceZulkifflee Sofee
 
Choosing the-best-crm-for-your-organization
Choosing the-best-crm-for-your-organizationChoosing the-best-crm-for-your-organization
Choosing the-best-crm-for-your-organizationSomayeh Jabbari
 
Exploring SAML 2.0-based federation in AWS.pptx
Exploring SAML 2.0-based federation in AWS.pptxExploring SAML 2.0-based federation in AWS.pptx
Exploring SAML 2.0-based federation in AWS.pptxInfosectrain3
 
Exploring SAML 2.0-based federation in AWS.pptx
Exploring SAML 2.0-based federation in AWS.pptxExploring SAML 2.0-based federation in AWS.pptx
Exploring SAML 2.0-based federation in AWS.pptxinfosec train
 
The software Visibility Problem
The software Visibility Problem The software Visibility Problem
The software Visibility Problem Jade Global
 
Graduation Project Presentation
Graduation Project PresentationGraduation Project Presentation
Graduation Project Presentationsameh samir
 
Top cloud CRM overview. Part 1 - Choosing the right CRM solution
Top cloud CRM overview. Part 1 - Choosing the right CRM solutionTop cloud CRM overview. Part 1 - Choosing the right CRM solution
Top cloud CRM overview. Part 1 - Choosing the right CRM solutionEugene Zozulya
 
GM and IT
GM and ITGM and IT
GM and ITsam ran
 
Cloud forum 2011 s poulley keynote v10
Cloud forum 2011 s poulley keynote v10Cloud forum 2011 s poulley keynote v10
Cloud forum 2011 s poulley keynote v10Mauricio Godoy
 
Cloud forum 2011 s poulley keynote v10
Cloud forum 2011 s poulley keynote v10Cloud forum 2011 s poulley keynote v10
Cloud forum 2011 s poulley keynote v10Mauricio Godoy
 
IBM Sterling B2B Integration
IBM Sterling B2B IntegrationIBM Sterling B2B Integration
IBM Sterling B2B IntegrationLightwell
 
IBM Sterling B2B Integration
IBM Sterling B2B IntegrationIBM Sterling B2B Integration
IBM Sterling B2B IntegrationLightwell
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access ManagementPrashanth BS
 

Similar to Wp saml v2_rs_3_24_2015 (20)

White Paper: DIY vs CIAM
White Paper: DIY vs CIAMWhite Paper: DIY vs CIAM
White Paper: DIY vs CIAM
 
SAML 101
SAML 101SAML 101
SAML 101
 
SAML Executive Overview
SAML Executive OverviewSAML Executive Overview
SAML Executive Overview
 
Data Sheet: Why Your eCommerce Platform Needs CIAM
Data Sheet: Why Your eCommerce Platform Needs CIAMData Sheet: Why Your eCommerce Platform Needs CIAM
Data Sheet: Why Your eCommerce Platform Needs CIAM
 
Implementing information federation
Implementing information federationImplementing information federation
Implementing information federation
 
Week 4 power point slide -1-case study 1-customer relationship....salesforce
Week 4  power point slide -1-case study 1-customer relationship....salesforceWeek 4  power point slide -1-case study 1-customer relationship....salesforce
Week 4 power point slide -1-case study 1-customer relationship....salesforce
 
Week 4 power point slide -1-case study 1-customer relationship....salesforce
Week 4  power point slide -1-case study 1-customer relationship....salesforceWeek 4  power point slide -1-case study 1-customer relationship....salesforce
Week 4 power point slide -1-case study 1-customer relationship....salesforce
 
Choosing the-best-crm-for-your-organization
Choosing the-best-crm-for-your-organizationChoosing the-best-crm-for-your-organization
Choosing the-best-crm-for-your-organization
 
Exploring SAML 2.0-based federation in AWS.pptx
Exploring SAML 2.0-based federation in AWS.pptxExploring SAML 2.0-based federation in AWS.pptx
Exploring SAML 2.0-based federation in AWS.pptx
 
Exploring SAML 2.0-based federation in AWS.pptx
Exploring SAML 2.0-based federation in AWS.pptxExploring SAML 2.0-based federation in AWS.pptx
Exploring SAML 2.0-based federation in AWS.pptx
 
The software Visibility Problem
The software Visibility Problem The software Visibility Problem
The software Visibility Problem
 
Graduation Project Presentation
Graduation Project PresentationGraduation Project Presentation
Graduation Project Presentation
 
Top cloud CRM overview. Part 1 - Choosing the right CRM solution
Top cloud CRM overview. Part 1 - Choosing the right CRM solutionTop cloud CRM overview. Part 1 - Choosing the right CRM solution
Top cloud CRM overview. Part 1 - Choosing the right CRM solution
 
GM and IT
GM and ITGM and IT
GM and IT
 
Cloud forum 2011 s poulley keynote v10
Cloud forum 2011 s poulley keynote v10Cloud forum 2011 s poulley keynote v10
Cloud forum 2011 s poulley keynote v10
 
Cloud forum 2011 s poulley keynote v10
Cloud forum 2011 s poulley keynote v10Cloud forum 2011 s poulley keynote v10
Cloud forum 2011 s poulley keynote v10
 
CRM Idol
CRM IdolCRM Idol
CRM Idol
 
IBM Sterling B2B Integration
IBM Sterling B2B IntegrationIBM Sterling B2B Integration
IBM Sterling B2B Integration
 
IBM Sterling B2B Integration
IBM Sterling B2B IntegrationIBM Sterling B2B Integration
IBM Sterling B2B Integration
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access Management
 

Recently uploaded

chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 

Recently uploaded (20)

chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 

Wp saml v2_rs_3_24_2015

  • 1. SAML AS AN SSO STANDARD FOR CUSTOMER IDENTITY MANAGEMENT How to Create a Frictionless, Secure Customer Identity Management Strategy
  • 2. PART 1: WHAT IS SAML?
  • 3. GIGYA.COM | 3 SAML in Context Security Assertion Markup Language (SAML) is an Extensible Markup Language (XML) standard that enables secure websites and services to exchange user authentication data. SAML-based single sign-on (SSO) standards are designed to create frictionless identity verification and management processes between separate yet affiliated systems. Dating back to 2001, SAML has evolved to support a range of identity federation and management needs. Some of today’s most popular third-party web applications such as Google Apps, Zendesk, and Salesforce use SAML to authenticate users. The end goals? Simplify data management. Streamline user flows. Keep customers engaged with your company. 54 percent of companies have difficulty managing and integrating data from today’s many varied sources, while 50 percent are concerned about consistent data quality (Destination CRM).
  • 4. GIGYA.COM | 4 SAML has developed a reputation as a solution for employee management for IT teams within nonprofit, government, small business, and enterprise organizations. Internally, organizations use SAML as an SSO service to manage employee, partner and contractor access to network-based applications. But the applications of SAML extend much further. Exploring Use Cases Within the past 5-10 years, the rise of ecommerce, social 
 networks, mobile and connected devices has created 
 the need for businesses to develop an external identity 
 access management (IAM) strategy to keep up 
 with the flood of identity data being created as 
 customers connect across channels.
  • 5. GIGYA.COM | 5 Where SAML stands out from other authentication mechanisms is that it allows businesses to identify who users are and communicate information about them. Businesses can add structure to disparate user data to tell a rich, compelling story about each user profile. Below is a hypothetical example for how a membership-only television site can use SAML to better understand and track their customers. How SAML Stands Out SAML: Authorization & Authentication Other Authentication Standards for Enterprise SSO Name: Emily Smith Job Title: Manager at tech company Gender: Female Level of Membership: Platinum Date Joined: 2009 Interest 1: Travel Interest 2: Documentaries Interest 3: Stand Up Comedy User has permission to access features: Yes Name: Emily Smith Email Address: emilysmith@testemail.com
  • 6. GIGYA.COM | 6 Enterprise organizations rely on multiple service providers -- such as customer support and payment processing software -- to support core user experience goals. Companies will also often team up, through strategic partnership initiatives, to introduce new products and services to shared customer bases. SAML in Action SAML creates a structured, secure, and scalable process to integrate data between these web applications and authentication processes.
  • 7. GIGYA.COM | 7 Comcast XFINITY customers can stream content online. Comcast uses SAML to authenticate users, and then to provide authorization information regarding whether the user's subscription includes access to Discovery's online video content. Example: Video Subscription Product
  • 8. PART 2: THE TECHNOLOGY
  • 9. GIGYA.COM | 9 Think of SAML as a “handshake with an upgrade.” SAML uses something called an assertion document -- an XML file that connects pieces of information -- between a service provider and an identity provider. In contrast, other standards provide identity management using only strings of text, which allow for only a very basic handshake. SAML’s assertion document is more elaborate and more structured than other standards, making it an ideal identity management solution for enterprise organizations. SAML (1) identifies the user and (2) communicates predefined characteristics about that user. OAuth, in contrast, communicates only an access token, or alpha-numeric string, which can be used to obtain information about the user, but does not provide that information directly. How SAML Works If you want to create an elaborate user profile, you need to go with SAML. Image Source: Salesforce
  • 10. GIGYA.COM | 10 The three SAML components include assertions, protocol, and binding. An assertion is a package of information related to user identity and security. There are three types of SAML assertions: authentication, attribute, and authorization. Authentication assertion is used to validate user identity, attribute assertion contains information about the user, and authorization assertion identifies what the user can do. Components of SAML Type of Assertion Question Asked Example Authentication Who is the user? The user is a valid user. Attribute What do we know about this particular user? The user is male, 34 years old, lives in Nebraska and subscribes to premium channels such as HBO. Authorization Is the user authorized to access this particular membership area or website feature? Comcast subscriber who pays for Discovery Channel access can watch Discovery Channel TV shows on XFINITY SAML protocol refers to how data gets transmitted from the sender to receiver. Sample binding determines how SAML requests map to standard messaging and communications protocols. SAML works with multiple protocols including Hypertext Transfer Protocol (HTTP) Simple Mail Transfer Protocol (SMTP), and File Transfer Protocol (FTP). SAML also supports SOAP, BizTalk, and Electronic Business XML (ebXML). Assertion Examples from Membership Video Site:
  • 11. GIGYA.COM | 11 SAML has a lot of moving parts -- it’s a complex topic that is challenging to grasp. We put together the following ‘cheat sheet’ for you to quickly and consistently reference as needed. SAML Cheat Sheet
  • 13. GIGYA.COM | 13 This diagram explains how an example service provider would verify users with an identity provider. SAML Visualized: How It All Fits Together - User attempts to reach a hosted service or application. - The service or application generates a SAML request, which is encoded and embedded into the URL for the partner’s SSO service. A parameter, set up as an identifier, is passed back without any modification or inspection. Image Source: Google
  • 14. GIGYA.COM | 14 - The application sends a redirect to the user’s browser, which includes the encoded SAML authentication request that should be submitted to the partner’s SSO service. - The partner decodes the SAML request and authenticates the user. - The partner generates a SAML response that contains the authenticated user's username. In accordance with the SAML 2.0 specification, this response is digitally signed with the partner's public and private DSA/RSA keys. SAML Visualized: How It All Fits Together (cont’d) Image Source: Google
  • 15. PART 3: THE BIG PICTURE -- IS SAML RIGHT FOR YOU?
  • 16. GIGYA.COM | 16 Companies are collecting volumes of first-party data for product, marketing, business development, and support initiatives. To be action-oriented in creating a high-impact user experience and making a monetization plan, this data needs to be organized into a framework that supports scalable processes -- to break down identity silos and create a consolidated customer profile. Adding Structure to Data SAML can help bind social and other unstructured profile data with internal profile data attributes via a trusted connection. This structured approach to organizing, analyzing, and using data provides the input to build predictive analytic capabilities, web personalization models, and marketing automation systems. Over 2.5 exabytes of data are created every single day (HBR). More than 90% of social media data is unstructured (BusinessInsider). 90% of all the data in the world has been created in the last two years (IBM).
  • 17. GIGYA.COM | 17 Enterprise organizations are targets for security breaches that could put them and their consumers at risk. Your identity management strategy needs to create an extremely secure environment for your businesses and your customers. SAML requires both the IdP and relying party to register with one another. The two sides exchange encryption keys and the SAML request-response sequence can be signed and validated. This is the most secure verification process available, as the two systems (1) know about each other and are (2) talking to each other directly. Addressing Security Risks A solution like OpenID, for example, allows a relying party to request authentication from an IdP without prior registration and is used for public authentication. It’s less secure than SAML. For this reason, SAML is the ideal option for consumer-facing enterprise organizations and companies -- like banks, for instance -- that are looking to engage in secure transactions.
  • 18. GIGYA.COM | 18 SAML’s strongest benefit is also its biggest challenge. SAML is much more elaborate than other solutions like OpenID and requires careful pre-planning -- it is much more time consuming to implement than other solutions. You have to configure the sender and the recipient and determine the data structure for your assertion document upfront. The Balancing Act of Planning The challenge with SAML is that, in order to make your system work, you have to configure your endpoint configuration as well as the configuration of the sender and receiver. Your system needs to be compatible with the SSO standard, and you’ll need an interface that accommodates your end users.
  • 19. GIGYA.COM | 19 Gigya's Customer Identity Management Platform allows companies to collect, consolidate, and manage first party customer data in the cloud, developing an end-to-end customer identity data management strategy built for today’s variety of channels, devices and data. With the ability to serve as a SAML service provider or identity provider, as well as function as the service provider for social login and any OpenID identity provider, Gigya can help your business choose and implement an SSO standard that meets your business goals. Where Gigya Fits In
  • 20. ABOUT GIGYA Gigya's Customer Identity Management Platform helps companies build better customer relationships by turning unknown visitors into known, loyal and engaged customers. With Gigya’s technology, businesses increase registrations and identify customers across devices, consolidate data into rich customer profiles, and provide better service, products and experiences by integrating data into marketing and service applications. Gigya's platform was designed from the ground up for social identities, mobile devices, consumer privacy and modern marketing. Gigya provides developers with the APIs they need to easily build and maintain secure and scalable registration, authentication, profile management, data analytics and third-party integrations. More than 700 of the world’s leading businesses such as Fox, Forbes, and Verizon rely on Gigya to build identity-driven relationships and to provide scalable, secure Customer Identity Management. For more details about Gigya, visit www.gigya.com. © 2014 Gigya Incorporated. All rights reserved. Gigya, the Gigya logo, and Customer Identity Management Platform are either registered trademarks or trademarks of Gigya Incorporated in the United States and/or other countries. All other trademarks are the property of their respective owners. Gigya does not own any end user data or maintain any other rights to this data, other than utilizing it to make Gigya's services available to our clients and their end users. Gigya acts as an agent or back-end vendor of its client's website or mobile application, to which the end user of our client granted permissions (if applicable). Gigya facilitates the collection, transfer and storage of end user data solely on behalf of its clients and at its clients' direction. For more information, please see Gigya's Privacy Policy, available at http://www.gigya.com/privacy-policy/. To learn how Gigya can help provide you with the tools and technology needed to develop a successful SAML strategy, visit gigya.com, or call us at 888.660.1469.