SlideShare a Scribd company logo
1 of 20
Download to read offline
SAML AS AN SSO STANDARD FOR
CUSTOMER IDENTITY MANAGEMENT
How to Create a Frictionless, Secure Customer Identity Management Strategy
PART 1: WHAT IS SAML?
GIGYA.COM | 3
SAML in Context
Security Assertion Markup Language (SAML) is an Extensible Markup Language (XML) standard that enables
secure websites and services to exchange user authentication data. SAML-based single sign-on (SSO)
standards are designed to create frictionless identity verification and management processes between
separate yet affiliated systems.
Dating back to 2001, SAML has evolved to support a range of identity federation and management needs.
Some of today’s most popular third-party web applications such as Google Apps, Zendesk, and Salesforce use
SAML to authenticate users.
The end goals? Simplify data management. Streamline user flows. Keep customers engaged with your
company.
54 percent of companies have difficulty managing and integrating data from today’s many
varied sources, while 50 percent are concerned about consistent data quality (Destination
CRM).
GIGYA.COM | 4
SAML has developed a reputation as a solution for employee management for IT teams within nonprofit,
government, small business, and enterprise organizations. Internally, organizations use SAML as an SSO
service to manage employee, partner and contractor access to network-based applications.
But the applications of SAML extend much further.
Exploring Use Cases
Within the past 5-10 years, the rise of ecommerce, social 

networks, mobile and connected devices has created 

the need for businesses to develop an external identity 

access management (IAM) strategy to keep up 

with the flood of identity data being created as 

customers connect across channels.
GIGYA.COM | 5
Where SAML stands out from other authentication mechanisms is that it allows businesses to identify
who users are and communicate information about them. Businesses can add structure to disparate
user data to tell a rich, compelling story about each user profile.
Below is a hypothetical example for how a membership-only television site can use SAML to better
understand and track their customers.
How SAML Stands Out
SAML: Authorization & Authentication Other Authentication Standards for Enterprise SSO
Name: Emily Smith
Job Title: Manager at tech company
Gender: Female
Level of Membership: Platinum
Date Joined: 2009
Interest 1: Travel
Interest 2: Documentaries
Interest 3: Stand Up Comedy
User has permission to access features: Yes
Name: Emily Smith
Email Address: emilysmith@testemail.com
GIGYA.COM | 6
Enterprise organizations rely on
multiple service providers -- such
as customer support and payment
processing software -- to support
core user experience goals.
Companies will also often team up,
through strategic partnership
initiatives, to introduce new
products and services to shared
customer bases.
SAML in Action
SAML creates a structured, secure, and scalable process
to integrate data between these web applications and
authentication processes.
GIGYA.COM | 7
Comcast XFINITY customers can stream content online. Comcast uses SAML to authenticate users,
and then to provide authorization information regarding whether the user's subscription includes
access to Discovery's online video content.
Example: Video Subscription Product
PART 2: THE TECHNOLOGY
GIGYA.COM | 9
Think of SAML as a “handshake with an upgrade.” SAML uses something called an assertion
document -- an XML file that connects pieces of information -- between a service provider and an
identity provider. In contrast, other standards provide identity management using only strings of text,
which allow for only a very basic handshake.
SAML’s assertion document is more elaborate and more structured than other standards, making it an
ideal identity management solution for enterprise organizations. SAML (1) identifies the user and (2)
communicates predefined characteristics about that user. OAuth, in contrast, communicates only an
access token, or alpha-numeric string, which can be used to obtain information about the user, but
does not provide that information directly.
How SAML Works
If you want to create
an elaborate user
profile, you need to
go with SAML.
Image Source:
Salesforce
GIGYA.COM | 10
The three SAML components include
assertions, protocol, and binding.
An assertion is a package of information
related to user identity and security.
There are three types of SAML
assertions: authentication, attribute, and
authorization. Authentication assertion is
used to validate user identity, attribute
assertion contains information about the
user, and authorization assertion
identifies what the user can do.
Components of SAML
Type of Assertion Question Asked Example
Authentication Who is the user? The user is a valid user.
Attribute
What do we know about this
particular user?
The user is male, 34 years
old, lives in Nebraska and
subscribes to premium
channels such as HBO.
Authorization
Is the user authorized to
access this particular
membership area or website
feature?
Comcast subscriber who
pays for Discovery Channel
access can watch Discovery
Channel TV shows on
XFINITY
SAML protocol refers to how data gets transmitted from the sender to receiver. Sample binding
determines how SAML requests map to standard messaging and communications protocols.
SAML works with multiple protocols including Hypertext Transfer Protocol (HTTP) Simple Mail Transfer
Protocol (SMTP), and File Transfer Protocol (FTP). SAML also supports SOAP, BizTalk, and Electronic
Business XML (ebXML).
Assertion Examples from Membership Video Site:
GIGYA.COM | 11
SAML has a lot of moving parts -- it’s a complex topic that is challenging to grasp. We put together the
following ‘cheat sheet’ for you to quickly and consistently reference as needed.
SAML Cheat Sheet
GIGYA.COM | 12
GIGYA.COM | 13
This diagram explains how an example
service provider would verify users with an
identity provider.
SAML Visualized:
How It All Fits
Together
- User attempts to reach a hosted service or
application.
- The service or application generates a SAML
request, which is encoded and embedded into
the URL for the partner’s SSO service. A
parameter, set up as an identifier, is passed
back without any modification or inspection.
Image Source: Google
GIGYA.COM | 14
- The application sends a redirect to the user’s
browser, which includes the encoded SAML
authentication request that should be
submitted to the partner’s SSO service.
- The partner decodes the SAML request and
authenticates the user.
- The partner generates a SAML response that
contains the authenticated user's username. In
accordance with the SAML 2.0 specification,
this response is digitally signed with the
partner's public and private DSA/RSA keys.
SAML Visualized:
How It All Fits
Together
(cont’d)
Image Source: Google
PART 3:
THE BIG PICTURE -- IS SAML RIGHT FOR YOU?
GIGYA.COM | 16
Companies are collecting volumes of first-party data for product, marketing, business development,
and support initiatives. To be action-oriented in creating a high-impact user experience and making a
monetization plan, this data needs to be organized into a framework that supports scalable processes
-- to break down identity silos and create a consolidated customer profile.
Adding Structure to Data
SAML can help bind social and
other unstructured profile data with
internal profile data attributes via a
trusted connection. This structured
approach to organizing, analyzing,
and using data provides the input
to build predictive analytic
capabilities, web personalization
models, and marketing automation
systems.
Over 2.5 exabytes of data are created every single
day (HBR).
More than 90% of social media data is unstructured
(BusinessInsider).
90% of all the data in the world has been created in
the last two years (IBM).
GIGYA.COM | 17
Enterprise organizations are targets for security breaches that could
put them and their consumers at risk. Your identity management
strategy needs to create an extremely secure environment for your
businesses and your customers.
SAML requires both the IdP and relying party to register with one
another. The two sides exchange encryption keys and the SAML
request-response sequence can be signed and validated. This is the
most secure verification process available, as the two systems (1)
know about each other and are (2) talking to each other directly.
Addressing Security Risks
A solution like OpenID, for example, allows a relying party to request authentication from an IdP
without prior registration and is used for public authentication. It’s less secure than SAML.
For this reason, SAML is the ideal option for consumer-facing enterprise organizations and companies
-- like banks, for instance -- that are looking to engage in secure transactions.
GIGYA.COM | 18
SAML’s strongest benefit is also its biggest challenge.
SAML is much more elaborate than other solutions like OpenID and requires careful pre-planning -- it
is much more time consuming to implement than other solutions. You have to configure the sender
and the recipient and determine the data structure for your assertion document upfront.
The Balancing Act of Planning
The challenge with SAML is that, in order to make your system work, you have to configure your
endpoint configuration as well as the configuration of the sender and receiver. Your system needs to be
compatible with the SSO standard, and you’ll need an interface that accommodates your end users.
GIGYA.COM | 19
Gigya's Customer Identity Management Platform allows companies to collect, consolidate, and
manage first party customer data in the cloud, developing an end-to-end customer identity data
management strategy built for today’s variety of channels, devices and data.
With the ability to serve as a SAML service provider or identity provider, as well as function as the
service provider for social login and any OpenID identity provider, Gigya can help your business
choose and implement an SSO standard that meets your business goals.
Where Gigya Fits In
ABOUT GIGYA
Gigya's Customer Identity Management Platform helps companies build better customer relationships by turning
unknown visitors into known, loyal and engaged customers. With Gigya’s technology, businesses increase registrations
and identify customers across devices, consolidate data into rich customer profiles, and provide better service, products
and experiences by integrating data into marketing and service applications.
Gigya's platform was designed from the ground up for social identities, mobile devices, consumer privacy and modern
marketing. Gigya provides developers with the APIs they need to easily build and maintain secure and scalable
registration, authentication, profile management, data analytics and third-party integrations.
More than 700 of the world’s leading businesses such as Fox, Forbes, and Verizon rely on Gigya to build identity-driven
relationships and to provide scalable, secure Customer Identity Management.
For more details about Gigya, visit www.gigya.com.
© 2014 Gigya Incorporated. All rights reserved.
Gigya, the Gigya logo, and Customer Identity Management Platform are either registered trademarks or trademarks of Gigya Incorporated in
the United States and/or other countries. All other trademarks are the property of their respective owners.
Gigya does not own any end user data or maintain any other rights to this data, other than utilizing it to make Gigya's services available to our
clients and their end users. Gigya acts as an agent or back-end vendor of its client's website or mobile application, to which the end user of
our client granted permissions (if applicable). Gigya facilitates the collection, transfer and storage of end user data solely on behalf of its
clients and at its clients' direction. For more information, please see Gigya's Privacy Policy, available at http://www.gigya.com/privacy-policy/.
To learn how Gigya can help provide you with the tools and technology needed to develop a successful
SAML strategy, visit gigya.com, or call us at 888.660.1469.

More Related Content

What's hot

What is SSO? An introduction to Single Sign On
What is SSO? An introduction to Single Sign OnWhat is SSO? An introduction to Single Sign On
What is SSO? An introduction to Single Sign OnRiddhi Sood
 
Integration Success with AWS and Boomi
Integration Success with AWS and BoomiIntegration Success with AWS and Boomi
Integration Success with AWS and BoomiAaronLieberman5
 
온라인 주문 서비스를 서버리스 아키텍쳐로 구축하기 - 김태우(Classmethod) :: AWS Community Day Online 2020
온라인 주문 서비스를 서버리스 아키텍쳐로 구축하기 - 김태우(Classmethod) :: AWS Community Day Online 2020온라인 주문 서비스를 서버리스 아키텍쳐로 구축하기 - 김태우(Classmethod) :: AWS Community Day Online 2020
온라인 주문 서비스를 서버리스 아키텍쳐로 구축하기 - 김태우(Classmethod) :: AWS Community Day Online 2020AWSKRUG - AWS한국사용자모임
 
Sharepoint online - Introducción
Sharepoint online - IntroducciónSharepoint online - Introducción
Sharepoint online - IntroducciónJuanBer Quinche
 
AWS Summit Seoul 2023 | 새로운 금융 서비스 출시 시 Agility 확보 방안
AWS Summit Seoul 2023 | 새로운 금융 서비스 출시 시 Agility 확보 방안AWS Summit Seoul 2023 | 새로운 금융 서비스 출시 시 Agility 확보 방안
AWS Summit Seoul 2023 | 새로운 금융 서비스 출시 시 Agility 확보 방안Amazon Web Services Korea
 
Importance of Solution Architecture in Automation
Importance of Solution Architecture in AutomationImportance of Solution Architecture in Automation
Importance of Solution Architecture in AutomationCristina Vidu
 
iPaaS: A platform for Integration technology convergence
iPaaS: A platform for Integration technology convergenceiPaaS: A platform for Integration technology convergence
iPaaS: A platform for Integration technology convergenceRaveendra Babu Darsi
 
What You Need to Know About Salesforce Customer 360
What You Need to Know About Salesforce Customer 360What You Need to Know About Salesforce Customer 360
What You Need to Know About Salesforce Customer 360Cloud Analogy
 
SharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseSharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseEvan Hodges
 
Single Sign On - Case Study
Single Sign On - Case StudySingle Sign On - Case Study
Single Sign On - Case StudyEbizon
 
Financial Service Cloud- Release Readiness LIVE, Winter’21
Financial Service Cloud- Release Readiness LIVE, Winter’21Financial Service Cloud- Release Readiness LIVE, Winter’21
Financial Service Cloud- Release Readiness LIVE, Winter’21Cloud Analogy
 
Introducing Cloudera Data Science Workbench for HDP 2.12.19
Introducing Cloudera Data Science Workbench for HDP 2.12.19Introducing Cloudera Data Science Workbench for HDP 2.12.19
Introducing Cloudera Data Science Workbench for HDP 2.12.19Cloudera, Inc.
 
[보험사를 위한 AWS Data Analytics Day] 2_금융의 핵심자산 Data, 글로ᄇ...
[보험사를 위한 AWS Data Analytics Day] 2_금융의 핵심자산 Data, 글로ᄇ...[보험사를 위한 AWS Data Analytics Day] 2_금융의 핵심자산 Data, 글로ᄇ...
[보험사를 위한 AWS Data Analytics Day] 2_금융의 핵심자산 Data, 글로ᄇ...AWS Korea 금융산업팀
 
API Management Platform Technical Evaluation Framework
API Management Platform Technical Evaluation FrameworkAPI Management Platform Technical Evaluation Framework
API Management Platform Technical Evaluation FrameworkWSO2
 
Cloud Migration Strategy and Best Practices
Cloud Migration Strategy and Best PracticesCloud Migration Strategy and Best Practices
Cloud Migration Strategy and Best PracticesQBurst
 
SuccessFactors BizX overivew
SuccessFactors BizX overivewSuccessFactors BizX overivew
SuccessFactors BizX overivewAndrey Kulikov
 

What's hot (20)

What is SSO? An introduction to Single Sign On
What is SSO? An introduction to Single Sign OnWhat is SSO? An introduction to Single Sign On
What is SSO? An introduction to Single Sign On
 
Integration Success with AWS and Boomi
Integration Success with AWS and BoomiIntegration Success with AWS and Boomi
Integration Success with AWS and Boomi
 
Talend Metadata Bridge
Talend Metadata BridgeTalend Metadata Bridge
Talend Metadata Bridge
 
온라인 주문 서비스를 서버리스 아키텍쳐로 구축하기 - 김태우(Classmethod) :: AWS Community Day Online 2020
온라인 주문 서비스를 서버리스 아키텍쳐로 구축하기 - 김태우(Classmethod) :: AWS Community Day Online 2020온라인 주문 서비스를 서버리스 아키텍쳐로 구축하기 - 김태우(Classmethod) :: AWS Community Day Online 2020
온라인 주문 서비스를 서버리스 아키텍쳐로 구축하기 - 김태우(Classmethod) :: AWS Community Day Online 2020
 
Sharepoint online - Introducción
Sharepoint online - IntroducciónSharepoint online - Introducción
Sharepoint online - Introducción
 
Scala for C# Developers
Scala for C# DevelopersScala for C# Developers
Scala for C# Developers
 
AWS Summit Seoul 2023 | 새로운 금융 서비스 출시 시 Agility 확보 방안
AWS Summit Seoul 2023 | 새로운 금융 서비스 출시 시 Agility 확보 방안AWS Summit Seoul 2023 | 새로운 금융 서비스 출시 시 Agility 확보 방안
AWS Summit Seoul 2023 | 새로운 금융 서비스 출시 시 Agility 확보 방안
 
Importance of Solution Architecture in Automation
Importance of Solution Architecture in AutomationImportance of Solution Architecture in Automation
Importance of Solution Architecture in Automation
 
iPaaS: A platform for Integration technology convergence
iPaaS: A platform for Integration technology convergenceiPaaS: A platform for Integration technology convergence
iPaaS: A platform for Integration technology convergence
 
What You Need to Know About Salesforce Customer 360
What You Need to Know About Salesforce Customer 360What You Need to Know About Salesforce Customer 360
What You Need to Know About Salesforce Customer 360
 
SharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseSharePoint Online vs. On-Premise
SharePoint Online vs. On-Premise
 
Single Sign On - Case Study
Single Sign On - Case StudySingle Sign On - Case Study
Single Sign On - Case Study
 
MULTI-CLOUD ARCHITECTURE
MULTI-CLOUD ARCHITECTUREMULTI-CLOUD ARCHITECTURE
MULTI-CLOUD ARCHITECTURE
 
Financial Service Cloud- Release Readiness LIVE, Winter’21
Financial Service Cloud- Release Readiness LIVE, Winter’21Financial Service Cloud- Release Readiness LIVE, Winter’21
Financial Service Cloud- Release Readiness LIVE, Winter’21
 
Introducing Cloudera Data Science Workbench for HDP 2.12.19
Introducing Cloudera Data Science Workbench for HDP 2.12.19Introducing Cloudera Data Science Workbench for HDP 2.12.19
Introducing Cloudera Data Science Workbench for HDP 2.12.19
 
[보험사를 위한 AWS Data Analytics Day] 2_금융의 핵심자산 Data, 글로ᄇ...
[보험사를 위한 AWS Data Analytics Day] 2_금융의 핵심자산 Data, 글로ᄇ...[보험사를 위한 AWS Data Analytics Day] 2_금융의 핵심자산 Data, 글로ᄇ...
[보험사를 위한 AWS Data Analytics Day] 2_금융의 핵심자산 Data, 글로ᄇ...
 
API Management Platform Technical Evaluation Framework
API Management Platform Technical Evaluation FrameworkAPI Management Platform Technical Evaluation Framework
API Management Platform Technical Evaluation Framework
 
Cloud Migration Strategy and Best Practices
Cloud Migration Strategy and Best PracticesCloud Migration Strategy and Best Practices
Cloud Migration Strategy and Best Practices
 
Aws s3 security
Aws s3 securityAws s3 security
Aws s3 security
 
SuccessFactors BizX overivew
SuccessFactors BizX overivewSuccessFactors BizX overivew
SuccessFactors BizX overivew
 

Viewers also liked

White Paper: Internal vs. External Identity Access Management
White Paper: Internal vs. External Identity Access Management White Paper: Internal vs. External Identity Access Management
White Paper: Internal vs. External Identity Access Management Gigya
 
Introduction to SAML 2.0
Introduction to SAML 2.0Introduction to SAML 2.0
Introduction to SAML 2.0Mika Koivisto
 
SAML Protocol Overview
SAML Protocol OverviewSAML Protocol Overview
SAML Protocol OverviewMike Schwartz
 
Saml vs Oauth : Which one should I use?
Saml vs Oauth : Which one should I use?Saml vs Oauth : Which one should I use?
Saml vs Oauth : Which one should I use?Anil Saldanha
 
Simplifying The S's: Single Sign-On, SPNEGO and SAML
Simplifying The S's: Single Sign-On, SPNEGO and SAMLSimplifying The S's: Single Sign-On, SPNEGO and SAML
Simplifying The S's: Single Sign-On, SPNEGO and SAMLGabriella Davis
 
RMLL 2013 - The SAML Protocol: Single Sign On for skilled people
RMLL 2013 - The SAML Protocol: Single Sign On for skilled peopleRMLL 2013 - The SAML Protocol: Single Sign On for skilled people
RMLL 2013 - The SAML Protocol: Single Sign On for skilled peopleClément OUDOT
 
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6Kenneth Peeples
 
LDAP, SAML and Hue
LDAP, SAML and HueLDAP, SAML and Hue
LDAP, SAML and Huegethue
 
Token Authentication for Java Applications
Token Authentication for Java ApplicationsToken Authentication for Java Applications
Token Authentication for Java ApplicationsStormpath
 
SAML and Other Types of Federation for Your Enterprise
SAML and Other Types of Federation for Your EnterpriseSAML and Other Types of Federation for Your Enterprise
SAML and Other Types of Federation for Your EnterpriseDenis Gundarev
 
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-onFast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-onCraig Dickson
 
White Paper: The Evolution of Consumer Identity: 10 Predictions for 2015
White Paper: The Evolution of Consumer Identity: 10 Predictions for 2015White Paper: The Evolution of Consumer Identity: 10 Predictions for 2015
White Paper: The Evolution of Consumer Identity: 10 Predictions for 2015Gigya
 
Digital Fuel & Forrester Cloud Computing IT Financial Management
Digital Fuel & Forrester Cloud  Computing IT Financial ManagementDigital Fuel & Forrester Cloud  Computing IT Financial Management
Digital Fuel & Forrester Cloud Computing IT Financial Managementyisbat
 
Ahmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threatAhmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threatnooralmousa
 

Viewers also liked (20)

White Paper: Internal vs. External Identity Access Management
White Paper: Internal vs. External Identity Access Management White Paper: Internal vs. External Identity Access Management
White Paper: Internal vs. External Identity Access Management
 
Introduction to SAML 2.0
Introduction to SAML 2.0Introduction to SAML 2.0
Introduction to SAML 2.0
 
SAML Smackdown
SAML SmackdownSAML Smackdown
SAML Smackdown
 
SAML Protocol Overview
SAML Protocol OverviewSAML Protocol Overview
SAML Protocol Overview
 
IdP, SAML, OAuth
IdP, SAML, OAuthIdP, SAML, OAuth
IdP, SAML, OAuth
 
Saml vs Oauth : Which one should I use?
Saml vs Oauth : Which one should I use?Saml vs Oauth : Which one should I use?
Saml vs Oauth : Which one should I use?
 
Simplifying The S's: Single Sign-On, SPNEGO and SAML
Simplifying The S's: Single Sign-On, SPNEGO and SAMLSimplifying The S's: Single Sign-On, SPNEGO and SAML
Simplifying The S's: Single Sign-On, SPNEGO and SAML
 
RMLL 2013 - The SAML Protocol: Single Sign On for skilled people
RMLL 2013 - The SAML Protocol: Single Sign On for skilled peopleRMLL 2013 - The SAML Protocol: Single Sign On for skilled people
RMLL 2013 - The SAML Protocol: Single Sign On for skilled people
 
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6
 
LDAP, SAML and Hue
LDAP, SAML and HueLDAP, SAML and Hue
LDAP, SAML and Hue
 
Saml in cloud
Saml in cloudSaml in cloud
Saml in cloud
 
Token Authentication for Java Applications
Token Authentication for Java ApplicationsToken Authentication for Java Applications
Token Authentication for Java Applications
 
SAML and Other Types of Federation for Your Enterprise
SAML and Other Types of Federation for Your EnterpriseSAML and Other Types of Federation for Your Enterprise
SAML and Other Types of Federation for Your Enterprise
 
Introduction to SAML
Introduction to SAMLIntroduction to SAML
Introduction to SAML
 
Single sign on using SAML
Single sign on using SAML Single sign on using SAML
Single sign on using SAML
 
Single Sign On 101
Single Sign On 101Single Sign On 101
Single Sign On 101
 
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-onFast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
 
White Paper: The Evolution of Consumer Identity: 10 Predictions for 2015
White Paper: The Evolution of Consumer Identity: 10 Predictions for 2015White Paper: The Evolution of Consumer Identity: 10 Predictions for 2015
White Paper: The Evolution of Consumer Identity: 10 Predictions for 2015
 
Digital Fuel & Forrester Cloud Computing IT Financial Management
Digital Fuel & Forrester Cloud  Computing IT Financial ManagementDigital Fuel & Forrester Cloud  Computing IT Financial Management
Digital Fuel & Forrester Cloud Computing IT Financial Management
 
Ahmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threatAhmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threat
 

Similar to How SAML Enables Secure Customer Identity Management

White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyWhite Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyGigya
 
Internal vs. external identity access management
Internal vs. external identity access managementInternal vs. external identity access management
Internal vs. external identity access managementTatiana Grisham
 
White Paper: DIY vs CIAM
White Paper: DIY vs CIAMWhite Paper: DIY vs CIAM
White Paper: DIY vs CIAMGigya
 
SAML Executive Overview
SAML Executive OverviewSAML Executive Overview
SAML Executive OverviewPortalGuard
 
Data Sheet: Why Your eCommerce Platform Needs CIAM
Data Sheet: Why Your eCommerce Platform Needs CIAMData Sheet: Why Your eCommerce Platform Needs CIAM
Data Sheet: Why Your eCommerce Platform Needs CIAMGigya
 
Implementing information federation
Implementing information federationImplementing information federation
Implementing information federationCory Casanave
 
Week 4 power point slide -1-case study 1-customer relationship....salesforce
Week 4  power point slide -1-case study 1-customer relationship....salesforceWeek 4  power point slide -1-case study 1-customer relationship....salesforce
Week 4 power point slide -1-case study 1-customer relationship....salesforceZulkifflee Sofee
 
Week 4 power point slide -1-case study 1-customer relationship....salesforce
Week 4  power point slide -1-case study 1-customer relationship....salesforceWeek 4  power point slide -1-case study 1-customer relationship....salesforce
Week 4 power point slide -1-case study 1-customer relationship....salesforceZulkifflee Sofee
 
Choosing the-best-crm-for-your-organization
Choosing the-best-crm-for-your-organizationChoosing the-best-crm-for-your-organization
Choosing the-best-crm-for-your-organizationSomayeh Jabbari
 
Exploring SAML 2.0-based federation in AWS.pptx
Exploring SAML 2.0-based federation in AWS.pptxExploring SAML 2.0-based federation in AWS.pptx
Exploring SAML 2.0-based federation in AWS.pptxInfosectrain3
 
Exploring SAML 2.0-based federation in AWS.pptx
Exploring SAML 2.0-based federation in AWS.pptxExploring SAML 2.0-based federation in AWS.pptx
Exploring SAML 2.0-based federation in AWS.pptxinfosec train
 
The software Visibility Problem
The software Visibility Problem The software Visibility Problem
The software Visibility Problem Jade Global
 
Industry Report: The State of Customer Data Integration in 2013
Industry Report: The State of Customer Data Integration in 2013Industry Report: The State of Customer Data Integration in 2013
Industry Report: The State of Customer Data Integration in 2013Scribe Software Corp.
 
Graduation Project Presentation
Graduation Project PresentationGraduation Project Presentation
Graduation Project Presentationsameh samir
 
Top cloud CRM overview. Part 1 - Choosing the right CRM solution
Top cloud CRM overview. Part 1 - Choosing the right CRM solutionTop cloud CRM overview. Part 1 - Choosing the right CRM solution
Top cloud CRM overview. Part 1 - Choosing the right CRM solutionEugene Zozulya
 
GM and IT
GM and ITGM and IT
GM and ITsam ran
 
Cloud forum 2011 s poulley keynote v10
Cloud forum 2011 s poulley keynote v10Cloud forum 2011 s poulley keynote v10
Cloud forum 2011 s poulley keynote v10Mauricio Godoy
 
Cloud forum 2011 s poulley keynote v10
Cloud forum 2011 s poulley keynote v10Cloud forum 2011 s poulley keynote v10
Cloud forum 2011 s poulley keynote v10Mauricio Godoy
 

Similar to How SAML Enables Secure Customer Identity Management (20)

White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyWhite Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
 
Internal vs. external identity access management
Internal vs. external identity access managementInternal vs. external identity access management
Internal vs. external identity access management
 
White Paper: DIY vs CIAM
White Paper: DIY vs CIAMWhite Paper: DIY vs CIAM
White Paper: DIY vs CIAM
 
SAML 101
SAML 101SAML 101
SAML 101
 
SAML Executive Overview
SAML Executive OverviewSAML Executive Overview
SAML Executive Overview
 
Data Sheet: Why Your eCommerce Platform Needs CIAM
Data Sheet: Why Your eCommerce Platform Needs CIAMData Sheet: Why Your eCommerce Platform Needs CIAM
Data Sheet: Why Your eCommerce Platform Needs CIAM
 
Implementing information federation
Implementing information federationImplementing information federation
Implementing information federation
 
Week 4 power point slide -1-case study 1-customer relationship....salesforce
Week 4  power point slide -1-case study 1-customer relationship....salesforceWeek 4  power point slide -1-case study 1-customer relationship....salesforce
Week 4 power point slide -1-case study 1-customer relationship....salesforce
 
Week 4 power point slide -1-case study 1-customer relationship....salesforce
Week 4  power point slide -1-case study 1-customer relationship....salesforceWeek 4  power point slide -1-case study 1-customer relationship....salesforce
Week 4 power point slide -1-case study 1-customer relationship....salesforce
 
Choosing the-best-crm-for-your-organization
Choosing the-best-crm-for-your-organizationChoosing the-best-crm-for-your-organization
Choosing the-best-crm-for-your-organization
 
Exploring SAML 2.0-based federation in AWS.pptx
Exploring SAML 2.0-based federation in AWS.pptxExploring SAML 2.0-based federation in AWS.pptx
Exploring SAML 2.0-based federation in AWS.pptx
 
Exploring SAML 2.0-based federation in AWS.pptx
Exploring SAML 2.0-based federation in AWS.pptxExploring SAML 2.0-based federation in AWS.pptx
Exploring SAML 2.0-based federation in AWS.pptx
 
The software Visibility Problem
The software Visibility Problem The software Visibility Problem
The software Visibility Problem
 
Industry Report: The State of Customer Data Integration in 2013
Industry Report: The State of Customer Data Integration in 2013Industry Report: The State of Customer Data Integration in 2013
Industry Report: The State of Customer Data Integration in 2013
 
Graduation Project Presentation
Graduation Project PresentationGraduation Project Presentation
Graduation Project Presentation
 
Top cloud CRM overview. Part 1 - Choosing the right CRM solution
Top cloud CRM overview. Part 1 - Choosing the right CRM solutionTop cloud CRM overview. Part 1 - Choosing the right CRM solution
Top cloud CRM overview. Part 1 - Choosing the right CRM solution
 
Basic concepts
Basic conceptsBasic concepts
Basic concepts
 
GM and IT
GM and ITGM and IT
GM and IT
 
Cloud forum 2011 s poulley keynote v10
Cloud forum 2011 s poulley keynote v10Cloud forum 2011 s poulley keynote v10
Cloud forum 2011 s poulley keynote v10
 
Cloud forum 2011 s poulley keynote v10
Cloud forum 2011 s poulley keynote v10Cloud forum 2011 s poulley keynote v10
Cloud forum 2011 s poulley keynote v10
 

More from Gigya

Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...Gigya
 
Case Study: STV Boosts Viewer Engagement and Campaign Yields with Gigya
Case Study: STV Boosts Viewer Engagement and Campaign Yields with GigyaCase Study: STV Boosts Viewer Engagement and Campaign Yields with Gigya
Case Study: STV Boosts Viewer Engagement and Campaign Yields with GigyaGigya
 
White Paper: Gigya's Information Security and Data Privacy Practices
White Paper: Gigya's Information Security and Data Privacy PracticesWhite Paper: Gigya's Information Security and Data Privacy Practices
White Paper: Gigya's Information Security and Data Privacy PracticesGigya
 
Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...
Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...
Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...Gigya
 
Gigya's China Data Center - Data Sheet
Gigya's China Data Center - Data SheetGigya's China Data Center - Data Sheet
Gigya's China Data Center - Data SheetGigya
 
The Chutes and Ladders of Customer Identity
The Chutes and Ladders of Customer IdentityThe Chutes and Ladders of Customer Identity
The Chutes and Ladders of Customer IdentityGigya
 
Data Sheet: Gigya and Global Regulatory Compliance
Data Sheet: Gigya and Global Regulatory ComplianceData Sheet: Gigya and Global Regulatory Compliance
Data Sheet: Gigya and Global Regulatory ComplianceGigya
 
White Paper: 2017 Predictions - French
White Paper: 2017 Predictions - FrenchWhite Paper: 2017 Predictions - French
White Paper: 2017 Predictions - FrenchGigya
 
White Paper: 2017 Predictions - German
White Paper: 2017 Predictions - GermanWhite Paper: 2017 Predictions - German
White Paper: 2017 Predictions - GermanGigya
 
Case study - American Kennel Club
Case study - American Kennel ClubCase study - American Kennel Club
Case study - American Kennel ClubGigya
 
Data Sheet: Corporate Overview
Data Sheet: Corporate OverviewData Sheet: Corporate Overview
Data Sheet: Corporate OverviewGigya
 
Gigya Infographic - Death Of A Password
Gigya Infographic - Death Of A PasswordGigya Infographic - Death Of A Password
Gigya Infographic - Death Of A PasswordGigya
 
GDPR Implications Customer Identity Management - German
GDPR Implications Customer Identity Management - GermanGDPR Implications Customer Identity Management - German
GDPR Implications Customer Identity Management - GermanGigya
 
White Paper: Managing consumer data privacy with Gigya (German)
White Paper: Managing consumer data privacy with Gigya (German)White Paper: Managing consumer data privacy with Gigya (German)
White Paper: Managing consumer data privacy with Gigya (German)Gigya
 
White Paper: Managing consumer data privacy with Gigya (French)
White Paper: Managing consumer data privacy with Gigya (French)White Paper: Managing consumer data privacy with Gigya (French)
White Paper: Managing consumer data privacy with Gigya (French)Gigya
 
Case Study: International CPG Company
Case Study: International CPG CompanyCase Study: International CPG Company
Case Study: International CPG CompanyGigya
 
Case Study: Travel and Hospitality Company
Case Study: Travel and Hospitality CompanyCase Study: Travel and Hospitality Company
Case Study: Travel and Hospitality CompanyGigya
 
Case Study: Enterprise Media Company
Case Study: Enterprise Media CompanyCase Study: Enterprise Media Company
Case Study: Enterprise Media CompanyGigya
 
Case Study: Large Enterprise eCommerce Company
Case Study: Large Enterprise eCommerce CompanyCase Study: Large Enterprise eCommerce Company
Case Study: Large Enterprise eCommerce CompanyGigya
 
Gigya Corporate Overview - French Edition
Gigya Corporate Overview - French EditionGigya Corporate Overview - French Edition
Gigya Corporate Overview - French EditionGigya
 

More from Gigya (20)

Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
 
Case Study: STV Boosts Viewer Engagement and Campaign Yields with Gigya
Case Study: STV Boosts Viewer Engagement and Campaign Yields with GigyaCase Study: STV Boosts Viewer Engagement and Campaign Yields with Gigya
Case Study: STV Boosts Viewer Engagement and Campaign Yields with Gigya
 
White Paper: Gigya's Information Security and Data Privacy Practices
White Paper: Gigya's Information Security and Data Privacy PracticesWhite Paper: Gigya's Information Security and Data Privacy Practices
White Paper: Gigya's Information Security and Data Privacy Practices
 
Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...
Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...
Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...
 
Gigya's China Data Center - Data Sheet
Gigya's China Data Center - Data SheetGigya's China Data Center - Data Sheet
Gigya's China Data Center - Data Sheet
 
The Chutes and Ladders of Customer Identity
The Chutes and Ladders of Customer IdentityThe Chutes and Ladders of Customer Identity
The Chutes and Ladders of Customer Identity
 
Data Sheet: Gigya and Global Regulatory Compliance
Data Sheet: Gigya and Global Regulatory ComplianceData Sheet: Gigya and Global Regulatory Compliance
Data Sheet: Gigya and Global Regulatory Compliance
 
White Paper: 2017 Predictions - French
White Paper: 2017 Predictions - FrenchWhite Paper: 2017 Predictions - French
White Paper: 2017 Predictions - French
 
White Paper: 2017 Predictions - German
White Paper: 2017 Predictions - GermanWhite Paper: 2017 Predictions - German
White Paper: 2017 Predictions - German
 
Case study - American Kennel Club
Case study - American Kennel ClubCase study - American Kennel Club
Case study - American Kennel Club
 
Data Sheet: Corporate Overview
Data Sheet: Corporate OverviewData Sheet: Corporate Overview
Data Sheet: Corporate Overview
 
Gigya Infographic - Death Of A Password
Gigya Infographic - Death Of A PasswordGigya Infographic - Death Of A Password
Gigya Infographic - Death Of A Password
 
GDPR Implications Customer Identity Management - German
GDPR Implications Customer Identity Management - GermanGDPR Implications Customer Identity Management - German
GDPR Implications Customer Identity Management - German
 
White Paper: Managing consumer data privacy with Gigya (German)
White Paper: Managing consumer data privacy with Gigya (German)White Paper: Managing consumer data privacy with Gigya (German)
White Paper: Managing consumer data privacy with Gigya (German)
 
White Paper: Managing consumer data privacy with Gigya (French)
White Paper: Managing consumer data privacy with Gigya (French)White Paper: Managing consumer data privacy with Gigya (French)
White Paper: Managing consumer data privacy with Gigya (French)
 
Case Study: International CPG Company
Case Study: International CPG CompanyCase Study: International CPG Company
Case Study: International CPG Company
 
Case Study: Travel and Hospitality Company
Case Study: Travel and Hospitality CompanyCase Study: Travel and Hospitality Company
Case Study: Travel and Hospitality Company
 
Case Study: Enterprise Media Company
Case Study: Enterprise Media CompanyCase Study: Enterprise Media Company
Case Study: Enterprise Media Company
 
Case Study: Large Enterprise eCommerce Company
Case Study: Large Enterprise eCommerce CompanyCase Study: Large Enterprise eCommerce Company
Case Study: Large Enterprise eCommerce Company
 
Gigya Corporate Overview - French Edition
Gigya Corporate Overview - French EditionGigya Corporate Overview - French Edition
Gigya Corporate Overview - French Edition
 

Recently uploaded

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

How SAML Enables Secure Customer Identity Management

  • 1. SAML AS AN SSO STANDARD FOR CUSTOMER IDENTITY MANAGEMENT How to Create a Frictionless, Secure Customer Identity Management Strategy
  • 2. PART 1: WHAT IS SAML?
  • 3. GIGYA.COM | 3 SAML in Context Security Assertion Markup Language (SAML) is an Extensible Markup Language (XML) standard that enables secure websites and services to exchange user authentication data. SAML-based single sign-on (SSO) standards are designed to create frictionless identity verification and management processes between separate yet affiliated systems. Dating back to 2001, SAML has evolved to support a range of identity federation and management needs. Some of today’s most popular third-party web applications such as Google Apps, Zendesk, and Salesforce use SAML to authenticate users. The end goals? Simplify data management. Streamline user flows. Keep customers engaged with your company. 54 percent of companies have difficulty managing and integrating data from today’s many varied sources, while 50 percent are concerned about consistent data quality (Destination CRM).
  • 4. GIGYA.COM | 4 SAML has developed a reputation as a solution for employee management for IT teams within nonprofit, government, small business, and enterprise organizations. Internally, organizations use SAML as an SSO service to manage employee, partner and contractor access to network-based applications. But the applications of SAML extend much further. Exploring Use Cases Within the past 5-10 years, the rise of ecommerce, social 
 networks, mobile and connected devices has created 
 the need for businesses to develop an external identity 
 access management (IAM) strategy to keep up 
 with the flood of identity data being created as 
 customers connect across channels.
  • 5. GIGYA.COM | 5 Where SAML stands out from other authentication mechanisms is that it allows businesses to identify who users are and communicate information about them. Businesses can add structure to disparate user data to tell a rich, compelling story about each user profile. Below is a hypothetical example for how a membership-only television site can use SAML to better understand and track their customers. How SAML Stands Out SAML: Authorization & Authentication Other Authentication Standards for Enterprise SSO Name: Emily Smith Job Title: Manager at tech company Gender: Female Level of Membership: Platinum Date Joined: 2009 Interest 1: Travel Interest 2: Documentaries Interest 3: Stand Up Comedy User has permission to access features: Yes Name: Emily Smith Email Address: emilysmith@testemail.com
  • 6. GIGYA.COM | 6 Enterprise organizations rely on multiple service providers -- such as customer support and payment processing software -- to support core user experience goals. Companies will also often team up, through strategic partnership initiatives, to introduce new products and services to shared customer bases. SAML in Action SAML creates a structured, secure, and scalable process to integrate data between these web applications and authentication processes.
  • 7. GIGYA.COM | 7 Comcast XFINITY customers can stream content online. Comcast uses SAML to authenticate users, and then to provide authorization information regarding whether the user's subscription includes access to Discovery's online video content. Example: Video Subscription Product
  • 8. PART 2: THE TECHNOLOGY
  • 9. GIGYA.COM | 9 Think of SAML as a “handshake with an upgrade.” SAML uses something called an assertion document -- an XML file that connects pieces of information -- between a service provider and an identity provider. In contrast, other standards provide identity management using only strings of text, which allow for only a very basic handshake. SAML’s assertion document is more elaborate and more structured than other standards, making it an ideal identity management solution for enterprise organizations. SAML (1) identifies the user and (2) communicates predefined characteristics about that user. OAuth, in contrast, communicates only an access token, or alpha-numeric string, which can be used to obtain information about the user, but does not provide that information directly. How SAML Works If you want to create an elaborate user profile, you need to go with SAML. Image Source: Salesforce
  • 10. GIGYA.COM | 10 The three SAML components include assertions, protocol, and binding. An assertion is a package of information related to user identity and security. There are three types of SAML assertions: authentication, attribute, and authorization. Authentication assertion is used to validate user identity, attribute assertion contains information about the user, and authorization assertion identifies what the user can do. Components of SAML Type of Assertion Question Asked Example Authentication Who is the user? The user is a valid user. Attribute What do we know about this particular user? The user is male, 34 years old, lives in Nebraska and subscribes to premium channels such as HBO. Authorization Is the user authorized to access this particular membership area or website feature? Comcast subscriber who pays for Discovery Channel access can watch Discovery Channel TV shows on XFINITY SAML protocol refers to how data gets transmitted from the sender to receiver. Sample binding determines how SAML requests map to standard messaging and communications protocols. SAML works with multiple protocols including Hypertext Transfer Protocol (HTTP) Simple Mail Transfer Protocol (SMTP), and File Transfer Protocol (FTP). SAML also supports SOAP, BizTalk, and Electronic Business XML (ebXML). Assertion Examples from Membership Video Site:
  • 11. GIGYA.COM | 11 SAML has a lot of moving parts -- it’s a complex topic that is challenging to grasp. We put together the following ‘cheat sheet’ for you to quickly and consistently reference as needed. SAML Cheat Sheet
  • 13. GIGYA.COM | 13 This diagram explains how an example service provider would verify users with an identity provider. SAML Visualized: How It All Fits Together - User attempts to reach a hosted service or application. - The service or application generates a SAML request, which is encoded and embedded into the URL for the partner’s SSO service. A parameter, set up as an identifier, is passed back without any modification or inspection. Image Source: Google
  • 14. GIGYA.COM | 14 - The application sends a redirect to the user’s browser, which includes the encoded SAML authentication request that should be submitted to the partner’s SSO service. - The partner decodes the SAML request and authenticates the user. - The partner generates a SAML response that contains the authenticated user's username. In accordance with the SAML 2.0 specification, this response is digitally signed with the partner's public and private DSA/RSA keys. SAML Visualized: How It All Fits Together (cont’d) Image Source: Google
  • 15. PART 3: THE BIG PICTURE -- IS SAML RIGHT FOR YOU?
  • 16. GIGYA.COM | 16 Companies are collecting volumes of first-party data for product, marketing, business development, and support initiatives. To be action-oriented in creating a high-impact user experience and making a monetization plan, this data needs to be organized into a framework that supports scalable processes -- to break down identity silos and create a consolidated customer profile. Adding Structure to Data SAML can help bind social and other unstructured profile data with internal profile data attributes via a trusted connection. This structured approach to organizing, analyzing, and using data provides the input to build predictive analytic capabilities, web personalization models, and marketing automation systems. Over 2.5 exabytes of data are created every single day (HBR). More than 90% of social media data is unstructured (BusinessInsider). 90% of all the data in the world has been created in the last two years (IBM).
  • 17. GIGYA.COM | 17 Enterprise organizations are targets for security breaches that could put them and their consumers at risk. Your identity management strategy needs to create an extremely secure environment for your businesses and your customers. SAML requires both the IdP and relying party to register with one another. The two sides exchange encryption keys and the SAML request-response sequence can be signed and validated. This is the most secure verification process available, as the two systems (1) know about each other and are (2) talking to each other directly. Addressing Security Risks A solution like OpenID, for example, allows a relying party to request authentication from an IdP without prior registration and is used for public authentication. It’s less secure than SAML. For this reason, SAML is the ideal option for consumer-facing enterprise organizations and companies -- like banks, for instance -- that are looking to engage in secure transactions.
  • 18. GIGYA.COM | 18 SAML’s strongest benefit is also its biggest challenge. SAML is much more elaborate than other solutions like OpenID and requires careful pre-planning -- it is much more time consuming to implement than other solutions. You have to configure the sender and the recipient and determine the data structure for your assertion document upfront. The Balancing Act of Planning The challenge with SAML is that, in order to make your system work, you have to configure your endpoint configuration as well as the configuration of the sender and receiver. Your system needs to be compatible with the SSO standard, and you’ll need an interface that accommodates your end users.
  • 19. GIGYA.COM | 19 Gigya's Customer Identity Management Platform allows companies to collect, consolidate, and manage first party customer data in the cloud, developing an end-to-end customer identity data management strategy built for today’s variety of channels, devices and data. With the ability to serve as a SAML service provider or identity provider, as well as function as the service provider for social login and any OpenID identity provider, Gigya can help your business choose and implement an SSO standard that meets your business goals. Where Gigya Fits In
  • 20. ABOUT GIGYA Gigya's Customer Identity Management Platform helps companies build better customer relationships by turning unknown visitors into known, loyal and engaged customers. With Gigya’s technology, businesses increase registrations and identify customers across devices, consolidate data into rich customer profiles, and provide better service, products and experiences by integrating data into marketing and service applications. Gigya's platform was designed from the ground up for social identities, mobile devices, consumer privacy and modern marketing. Gigya provides developers with the APIs they need to easily build and maintain secure and scalable registration, authentication, profile management, data analytics and third-party integrations. More than 700 of the world’s leading businesses such as Fox, Forbes, and Verizon rely on Gigya to build identity-driven relationships and to provide scalable, secure Customer Identity Management. For more details about Gigya, visit www.gigya.com. © 2014 Gigya Incorporated. All rights reserved. Gigya, the Gigya logo, and Customer Identity Management Platform are either registered trademarks or trademarks of Gigya Incorporated in the United States and/or other countries. All other trademarks are the property of their respective owners. Gigya does not own any end user data or maintain any other rights to this data, other than utilizing it to make Gigya's services available to our clients and their end users. Gigya acts as an agent or back-end vendor of its client's website or mobile application, to which the end user of our client granted permissions (if applicable). Gigya facilitates the collection, transfer and storage of end user data solely on behalf of its clients and at its clients' direction. For more information, please see Gigya's Privacy Policy, available at http://www.gigya.com/privacy-policy/. To learn how Gigya can help provide you with the tools and technology needed to develop a successful SAML strategy, visit gigya.com, or call us at 888.660.1469.