SlideShare a Scribd company logo
1 of 2
Download to read offline
SuzannConnell
Below are brief summaries of an ITs professional view vs. an end-user’s snapshot
view of a few of the benefits of SAML.
SAML
An IT Professional’s Snapshot View An End User’s Snapshot View
What is SAML?
SAML is a multi-tenanted SaaS and
App service similar to the federation
pattern or token-based authN/authZ.
What is SAML?
SAML is the acronym for Security
Assertion Markup Language. SAML
eliminates the need to remember
and use multiple usernames and
passwords for software and apps.
How does SAML work?
SAML works between identity
providers, service providers and
users by asserting the identity of the
user to a system. The identity
provider issues a SAML token to the
user after inspection. The browser is
redirected to the service provider
seamlessly. IT managers have the
responsibility to set a single-factor or
multi-factor authentication.
How does SAML work?
SAML works in a browser or a
mobile device as a link. Clicking the
link gives you access to software
and apps that your corporation uses
without having to use your
username and password separately
for each. Sign in to software and
apps using a single, web-based link.
One click gives you access to all.
What are the benefits of using
SAML?
A few benefits include browser
based application, digitally signed
XML tokens, large SML payloads,
and multiple security options. SAML
supports enterprise to enterprise
and enterprise to SaaS. SAML shifts
the focus from concerns about help
desk user name and password calls
What are the benefits of using
SAML?
SAML saves you time and
eliminates the frustration of
remembering various user names
and passwords. This results in fewer
keystrokes, and erases the need to
contact IT support for username and
password assistance.
SuzannConnell
2
SAML
An IT Professional’s Snapshot View An End User’s Snapshot View
to infrastructure. Users connect
directly to the identity provider.
An additional benefit is that you will
not become locked out from
software if you accidently type a
password incorrectly after multiple
times. You will not have to type any
passwords.
Best practices summary
Provide a no-code simplified policy-
based enablement of SAML SSO.
Consider using an API gateway.
Best practices summary
Put a passcode on mobile devices,
laptops and desktops so that others
cannot access your SAML link.
Suzann Connell, M.Ed.
Instructional Design Consultant
suzann@suzannconnell.com

More Related Content

Viewers also liked

Viewers also liked (10)

Zertifikat_HS-Fresenius1
Zertifikat_HS-Fresenius1Zertifikat_HS-Fresenius1
Zertifikat_HS-Fresenius1
 
Ipad slides for a larger audience
Ipad slides for a larger audienceIpad slides for a larger audience
Ipad slides for a larger audience
 
02BDO
02BDO02BDO
02BDO
 
Fix you
Fix youFix you
Fix you
 
planeación
planeación planeación
planeación
 
Uni̇quehu metaposi̇hu phi̇losopher efruzhu hu1 message1sessi̇on1
Uni̇quehu  metaposi̇hu   phi̇losopher  efruzhu  hu1 message1sessi̇on1Uni̇quehu  metaposi̇hu   phi̇losopher  efruzhu  hu1 message1sessi̇on1
Uni̇quehu metaposi̇hu phi̇losopher efruzhu hu1 message1sessi̇on1
 
Programa del III Taller Internacional sobre realización de Tesis Doctorales ...
Programa del  III Taller Internacional sobre realización de Tesis Doctorales ...Programa del  III Taller Internacional sobre realización de Tesis Doctorales ...
Programa del III Taller Internacional sobre realización de Tesis Doctorales ...
 
Sindrome Sjogren
Sindrome SjogrenSindrome Sjogren
Sindrome Sjogren
 
Fiche produit ERE 2015 anglais
Fiche produit ERE 2015 anglaisFiche produit ERE 2015 anglais
Fiche produit ERE 2015 anglais
 
Relação de todas especialidades do novo manual
Relação de todas especialidades do novo manualRelação de todas especialidades do novo manual
Relação de todas especialidades do novo manual
 

Similar to SAML101

Product update sso authentication method released for orangescrum
Product update  sso authentication method released for orangescrumProduct update  sso authentication method released for orangescrum
Product update sso authentication method released for orangescrumOrangescrum
 
Attacking SSO (SAML) - Breaking into the front door of Authentication
Attacking SSO (SAML) - Breaking into the front door of AuthenticationAttacking SSO (SAML) - Breaking into the front door of Authentication
Attacking SSO (SAML) - Breaking into the front door of AuthenticationAmit Kumar
 
SAML Protocol Overview
SAML Protocol OverviewSAML Protocol Overview
SAML Protocol OverviewMike Schwartz
 
White Paper: Saml as an SSO Standard for Customer Identity Management
White Paper: Saml as an SSO Standard for Customer Identity ManagementWhite Paper: Saml as an SSO Standard for Customer Identity Management
White Paper: Saml as an SSO Standard for Customer Identity ManagementGigya
 
Wp saml v2_rs_3_24_2015
Wp saml v2_rs_3_24_2015Wp saml v2_rs_3_24_2015
Wp saml v2_rs_3_24_2015Elaine Sun
 
Exploring SAML 2.0-based federation in AWS.pptx
Exploring SAML 2.0-based federation in AWS.pptxExploring SAML 2.0-based federation in AWS.pptx
Exploring SAML 2.0-based federation in AWS.pptxInfosectrain3
 
Exploring SAML 2.0-based federation in AWS.pptx
Exploring SAML 2.0-based federation in AWS.pptxExploring SAML 2.0-based federation in AWS.pptx
Exploring SAML 2.0-based federation in AWS.pptxinfosec train
 
Why Mulesoft ?
Why Mulesoft ?Why Mulesoft ?
Why Mulesoft ?Bui Kiet
 
The software Visibility Problem
The software Visibility Problem The software Visibility Problem
The software Visibility Problem Jade Global
 
SAML Executive Overview
SAML Executive OverviewSAML Executive Overview
SAML Executive OverviewPortalGuard
 
Become a Part of Internet of Things (IoT) Revolution with CONNECT2.ME
Become a Part of Internet of Things (IoT) Revolution with CONNECT2.MEBecome a Part of Internet of Things (IoT) Revolution with CONNECT2.ME
Become a Part of Internet of Things (IoT) Revolution with CONNECT2.MEPlasma Computing Group
 
Software Asset Management Datasheet
Software Asset Management DatasheetSoftware Asset Management Datasheet
Software Asset Management DatasheetJade Global
 
Better Together: Combine Real User Monitoring with Synthetics
Better Together: Combine Real User Monitoring with SyntheticsBetter Together: Combine Real User Monitoring with Synthetics
Better Together: Combine Real User Monitoring with SyntheticsSidharthKumar13
 
Microsoft Cloud Services Licensing
Microsoft Cloud Services Licensing Microsoft Cloud Services Licensing
Microsoft Cloud Services Licensing FlorisKlaver1
 
APM Talk
APM TalkAPM Talk
APM TalkMongoDB
 

Similar to SAML101 (20)

Product update sso authentication method released for orangescrum
Product update  sso authentication method released for orangescrumProduct update  sso authentication method released for orangescrum
Product update sso authentication method released for orangescrum
 
SAML 101
SAML 101SAML 101
SAML 101
 
Attacking SSO (SAML) - Breaking into the front door of Authentication
Attacking SSO (SAML) - Breaking into the front door of AuthenticationAttacking SSO (SAML) - Breaking into the front door of Authentication
Attacking SSO (SAML) - Breaking into the front door of Authentication
 
SAML Protocol Overview
SAML Protocol OverviewSAML Protocol Overview
SAML Protocol Overview
 
White Paper: Saml as an SSO Standard for Customer Identity Management
White Paper: Saml as an SSO Standard for Customer Identity ManagementWhite Paper: Saml as an SSO Standard for Customer Identity Management
White Paper: Saml as an SSO Standard for Customer Identity Management
 
Wp saml v2_rs_3_24_2015
Wp saml v2_rs_3_24_2015Wp saml v2_rs_3_24_2015
Wp saml v2_rs_3_24_2015
 
Exploring SAML 2.0-based federation in AWS.pptx
Exploring SAML 2.0-based federation in AWS.pptxExploring SAML 2.0-based federation in AWS.pptx
Exploring SAML 2.0-based federation in AWS.pptx
 
Exploring SAML 2.0-based federation in AWS.pptx
Exploring SAML 2.0-based federation in AWS.pptxExploring SAML 2.0-based federation in AWS.pptx
Exploring SAML 2.0-based federation in AWS.pptx
 
Mule esb presentation
Mule esb presentationMule esb presentation
Mule esb presentation
 
Why Mulesoft ?
Why Mulesoft ?Why Mulesoft ?
Why Mulesoft ?
 
Saas security
Saas securitySaas security
Saas security
 
The software Visibility Problem
The software Visibility Problem The software Visibility Problem
The software Visibility Problem
 
SAML Executive Overview
SAML Executive OverviewSAML Executive Overview
SAML Executive Overview
 
Muleesb
MuleesbMuleesb
Muleesb
 
Become a Part of Internet of Things (IoT) Revolution with CONNECT2.ME
Become a Part of Internet of Things (IoT) Revolution with CONNECT2.MEBecome a Part of Internet of Things (IoT) Revolution with CONNECT2.ME
Become a Part of Internet of Things (IoT) Revolution with CONNECT2.ME
 
Software Asset Management Datasheet
Software Asset Management DatasheetSoftware Asset Management Datasheet
Software Asset Management Datasheet
 
Better Together: Combine Real User Monitoring with Synthetics
Better Together: Combine Real User Monitoring with SyntheticsBetter Together: Combine Real User Monitoring with Synthetics
Better Together: Combine Real User Monitoring with Synthetics
 
Sam and the Cloud
Sam and the CloudSam and the Cloud
Sam and the Cloud
 
Microsoft Cloud Services Licensing
Microsoft Cloud Services Licensing Microsoft Cloud Services Licensing
Microsoft Cloud Services Licensing
 
APM Talk
APM TalkAPM Talk
APM Talk
 

SAML101

  • 1. SuzannConnell Below are brief summaries of an ITs professional view vs. an end-user’s snapshot view of a few of the benefits of SAML. SAML An IT Professional’s Snapshot View An End User’s Snapshot View What is SAML? SAML is a multi-tenanted SaaS and App service similar to the federation pattern or token-based authN/authZ. What is SAML? SAML is the acronym for Security Assertion Markup Language. SAML eliminates the need to remember and use multiple usernames and passwords for software and apps. How does SAML work? SAML works between identity providers, service providers and users by asserting the identity of the user to a system. The identity provider issues a SAML token to the user after inspection. The browser is redirected to the service provider seamlessly. IT managers have the responsibility to set a single-factor or multi-factor authentication. How does SAML work? SAML works in a browser or a mobile device as a link. Clicking the link gives you access to software and apps that your corporation uses without having to use your username and password separately for each. Sign in to software and apps using a single, web-based link. One click gives you access to all. What are the benefits of using SAML? A few benefits include browser based application, digitally signed XML tokens, large SML payloads, and multiple security options. SAML supports enterprise to enterprise and enterprise to SaaS. SAML shifts the focus from concerns about help desk user name and password calls What are the benefits of using SAML? SAML saves you time and eliminates the frustration of remembering various user names and passwords. This results in fewer keystrokes, and erases the need to contact IT support for username and password assistance.
  • 2. SuzannConnell 2 SAML An IT Professional’s Snapshot View An End User’s Snapshot View to infrastructure. Users connect directly to the identity provider. An additional benefit is that you will not become locked out from software if you accidently type a password incorrectly after multiple times. You will not have to type any passwords. Best practices summary Provide a no-code simplified policy- based enablement of SAML SSO. Consider using an API gateway. Best practices summary Put a passcode on mobile devices, laptops and desktops so that others cannot access your SAML link. Suzann Connell, M.Ed. Instructional Design Consultant suzann@suzannconnell.com