Pricing Get Quote
 
 
Blog

SAML SSO: What you need to know

Written by Shruthi KarunakaranSSO3 min read

On this page
  • What is SAML and how does it work?
  • What is a SAML provider and what are their types?
  • What is SAML-based SSO authentication and authorization?
  • What is SAML assertion?
  • How does SAML-based SSO work?
  • SAML flow
  • Benefits of SAML
  • SAML-based SSO with ADSelfService Plus
  • Highlights of ADSelfService Plus
  • People also ask

What is SAML and how does it work?

SAML is a type of SSO standard. It defines a set of protocols that allows users to use a single set of credentials to access a host of applications, like Microsoft 365, Salesforce, and Google Workspace, to name a few.

SAML helps organizations simplify access to enterprise applications.

What is a SAML provider and what are their types?

A SAML provider is any server that supports authentication and authorization of a user during a SAML request. SAML comprises of two providers:

  • Service provider (SP): The enterprise applications that will be accessed by users.
  • Identity provider (IdP): The system that performs user authentication.

The IdP authenticates a user by verifying their passwords, biometrics, or security tokens. Once authenticated, the IdP issues tokens or assertions to the service provider. The SP uses this to provide access to different applications. Think of an IdP as a keymaker who creates a master key to access the many rooms in your house. Think of SPs as different rooms that you require access to. By using a single master key (IdP), you get to access all the different rooms (SPs) in your house.

What is SAML-based SSO authentication and authorization?

SAML provides a secure way to authenticate user identities between the SPs and IdPs while allowing them to exist as separate entities. SAML transactions, or the standardized communications between the SP and the IdP, happen in extensible markup language (XML).

To understand the interaction between SAML IdP and SP, you must understand the difference between SAML authentication and SAML authorization.

SAML authenticationSAML authorization
The process of verifying user identity via their entered credentials.Telling the SP what level of access to grant to the authenticated user.

What is SAML assertion?

A SAML assertion is a package of messages that notifies the SP that a user is signed in. It contains all the information necessary for the SP to confirm that users are who they claim to be. This includes information on the source of the assertion, at what time it was issued, and what conditions made the assertion valid. The IdP generates information as to when a particular user was authenticated, and by what means the user was authenticated. The assertion also contains the list of attributes associated with a particular user, which is referred to as claims, and the authorization decision, that is, whether the user was granted or denied access to a particular source.

How does SAML-based SSO work?

Let's consider a real-world example. Imagine you work for an organization that requires access to multiple applications. Previously, you'd need to remember different usernames and passwords for each app, leading to password fatigue, wasted time, and repetitive effort. By implementing SAML, you can seamlessly login to the IdP once and access all applications without needing to login again. SAML offers two methods to initiate SSO.

  • SP-initiated SSO
    • When a user logs into a SAML-enabled application via SSO, the SP requests authentication from the IdP.
    • The IdP authenticates the user's credentials and returns the assertion back to the SP.
    • The SP verifies the XML document created based on the SAML standards by the IdP. This XML document is called the SAML assertion. The assertion is signed with an X.509 certificate by the IdP.
    • The SP verifies the authenticity of the assertion using a copy of the certificate's fingerprint.
    • Once the verification of the user is complete, the user can access the SP and all other connected applications without having to enter the password again.
    • This flow would typically be initiated by a login button within the SP.
  • ldP-initiated SSO
    • In this method, the user logs directly into the IdP's portal or application.
    • Once logged in, the user selects the SP application in the IdP's catalog.
    • The IdP redirects the user to the SP, along with the SAML assertion.
    • The SP receives the SAML assertion and validates it.
    • Once validated, the user is granted access and can login to all other applications without re-entering the password.

SAML flow

A flow diagram of how SAML works

Benefits of SAML

Seamless access: Users can login once into the IdP and access all the different applications without reentering passwords. This saves time and improves efficiency.

Centralized authentication: By centralizing the login from an IdP, organizations can implement stronger security measures like MFA and password policies.

Scalability: SAML can integrate and handle a large number of applications and services.

Enhanced security: SAML reduces the risk of password related attacks by minimizing the use of passwords to a great extent.

SAML-based SSO with ADSelfService Plus

ManageEngine ADSelfService Plus, an integrated Active Directory self-service password management and SSO solution , acts as the IdP for enterprise applications. It uses the highly secure and industry standard SAML 2.0 to provide SSO for cloud applications like Salesforce, Microsoft 365, and Google Workspace, among others.

How do you set up SAML for an application

ADSelfService Plus lets you configure SAML for a wide range of applications straight out of the box. You can also add custom applications that support SAML by entering the app details, selecting the supported SSO flow, uploading metadata, and configuring the encryption. Refer to the configuration help document for detailed steps.

Highlights of ADSelfService Plus

Aside from SAML-based enterprise SSO, ADSelfService Plus also provides:

Multi-factor authentication

With up to 20 different authenticators available, IT administrators have a wide variety of options to choose from to verify the users' identities before they log into enterprise applications through SSO.

Self-service password reset and account unlock

Users are empowered to reset their own passwords and unlock their accounts without having to approach the help desk.

Password Policy Enforcer

Enables IT admins to enforce restrictions on the type of passwords that users can create. Restrictions can be placed on characters, repetition, pattern, and length.

ADSelfService Plus' SAML-based SSO empowers employees to access multiple applications with just one set of credentials

People also ask

What is SAML-based SSO?

SAML-based single sign-on (SSO) is a security standard that allows users to log in to multiple applications with a single set of credentials. It uses the SAML protocol to securely exchange authentication and authorization information between an identity provider (IdP) and a service provider (SP).

What is SAML vs. OAuth?

SAML is used for authentication and authorization, securely exchanging information between an identity provider (IdP) and a service provider (SP). OAuth is used for authorization, granting third-party applications limited access to user resources without sharing explicit credentials. Choosing between SAML and OAuth comes down to you specific requirements. If you're looking for enterprise-level SSO to access multiple web applications, go with SAML. To integrate with third-party applications without exposing your credentials, go with OAuth.

What is the difference between SAML and OIDC?

SAML is used for authentication and authorization, securely transferring user identity between identity provider (IdP) and service provider (SP). OpenID Connect (OIDC) builds on OAuth 2.0, focusing on authentication and providing user information in JSON Web Tokens (JWTs). While SAML is more complex and secure, OIDC is simpler and more suited for modern web applications.

 

ADSelfService Plus trusted by

ToshibaIBM
CHSiSymantec
Alcatel LucentNorthrop Grumman
L & T InfotechCisco
Ebay
Embark on a journey towards identity security and Zero Trust
Email Download Link