SlideShare a Scribd company logo
1 of 20
Download to read offline
SAML AS AN SSO STANDARD FOR
CUSTOMER IDENTITY MANAGEMENT
How to Create a Frictionless, Secure Customer Identity Management Strategy
PART 1: WHAT IS SAML?
GIGYA.COM | 3
SAML in Context
Security Assertion Markup Language (SAML) is an Extensible Markup Language (XML) standard that enables
secure websites and services to exchange user authentication data. SAML-based single sign-on (SSO)
standards are designed to create frictionless identity verification and management processes between
separate yet affiliated systems.
Dating back to 2001, SAML has evolved to support a range of identity federation and management needs.
Some of today’s most popular third-party web applications such as Google Apps, Zendesk, and Salesforce use
SAML to authenticate users.
The end goals? Simplify data management. Streamline user flows. Keep customers engaged with your
company.
54 percent of companies have difficulty managing and integrating data from today’s many
varied sources, while 50 percent are concerned about consistent data quality (Destination
CRM).
GIGYA.COM | 4
SAML has developed a reputation as a solution for employee management for IT teams within nonprofit,
government, small business, and enterprise organizations. Internally, organizations use SAML as an SSO
service to manage employee, partner and contractor access to network-based applications.
But the applications of SAML extend much further.
Exploring Use Cases
Within the past 5-10 years, the rise of ecommerce, social 

networks, mobile and connected devices has created 

the need for businesses to develop an external identity 

access management (IAM) strategy to keep up 

with the flood of identity data being created as 

customers connect across channels.
GIGYA.COM | 5
Where SAML stands out from other authentication mechanisms is that it allows businesses to identify
who users are and communicate information about them. Businesses can add structure to disparate
user data to tell a rich, compelling story about each user profile.
Below is a hypothetical example for how a membership-only television site can use SAML to better
understand and track their customers.
How SAML Stands Out
SAML: Authorization & Authentication Other Authentication Standards for Enterprise SSO
Name: Emily Smith
Job Title: Manager at tech company
Gender: Female
Level of Membership: Platinum
Date Joined: 2009
Interest 1: Travel
Interest 2: Documentaries
Interest 3: Stand Up Comedy
User has permission to access features: Yes
Name: Emily Smith
Email Address: emilysmith@testemail.com
GIGYA.COM | 6
Enterprise organizations rely on
multiple service providers -- such
as customer support and payment
processing software -- to support
core user experience goals.
Companies will also often team up,
through strategic partnership
initiatives, to introduce new
products and services to shared
customer bases.
SAML in Action
SAML creates a structured, secure, and scalable process
to integrate data between these web applications and
authentication processes.
GIGYA.COM | 7
Comcast XFINITY customers can stream content online. Comcast uses SAML to authenticate users,
and then to provide authorization information regarding whether the user's subscription includes
access to Discovery's online video content.
Example: Video Subscription Product
PART 2: THE TECHNOLOGY
GIGYA.COM | 9
Think of SAML as a “handshake with an upgrade.” SAML uses something called an assertion
document -- an XML file that connects pieces of information -- between a service provider and an
identity provider. In contrast, other standards provide identity management using only strings of text,
which allow for only a very basic handshake.
SAML’s assertion document is more elaborate and more structured than other standards, making it an
ideal identity management solution for enterprise organizations. SAML (1) identifies the user and (2)
communicates predefined characteristics about that user. OAuth, in contrast, communicates only an
access token, or alpha-numeric string, which can be used to obtain information about the user, but
does not provide that information directly.
How SAML Works
If you want to create
an elaborate user
profile, you need to
go with SAML.
Image Source:
Salesforce
GIGYA.COM | 10
The three SAML components include
assertions, protocol, and binding.
An assertion is a package of information
related to user identity and security.
There are three types of SAML
assertions: authentication, attribute, and
authorization. Authentication assertion is
used to validate user identity, attribute
assertion contains information about the
user, and authorization assertion
identifies what the user can do.
Components of SAML
Type of Assertion Question Asked Example
Authentication Who is the user? The user is a valid user.
Attribute
What do we know about this
particular user?
The user is male, 34 years
old, lives in Nebraska and
subscribes to premium
channels such as HBO.
Authorization
Is the user authorized to
access this particular
membership area or website
feature?
Comcast subscriber who
pays for Discovery Channel
access can watch Discovery
Channel TV shows on
XFINITY
SAML protocol refers to how data gets transmitted from the sender to receiver. Sample binding
determines how SAML requests map to standard messaging and communications protocols.
SAML works with multiple protocols including Hypertext Transfer Protocol (HTTP) Simple Mail Transfer
Protocol (SMTP), and File Transfer Protocol (FTP). SAML also supports SOAP, BizTalk, and Electronic
Business XML (ebXML).
Assertion Examples from Membership Video Site:
GIGYA.COM | 11
SAML has a lot of moving parts -- it’s a complex topic that is challenging to grasp. We put together the
following ‘cheat sheet’ for you to quickly and consistently reference as needed.
SAML Cheat Sheet
GIGYA.COM | 12
GIGYA.COM | 13
This diagram explains how an example
service provider would verify users with an
identity provider.
SAML Visualized:
How It All Fits
Together
- User attempts to reach a hosted service or
application.
- The service or application generates a SAML
request, which is encoded and embedded into
the URL for the partner’s SSO service. A
parameter, set up as an identifier, is passed
back without any modification or inspection.
Image Source: Google
GIGYA.COM | 14
- The application sends a redirect to the user’s
browser, which includes the encoded SAML
authentication request that should be
submitted to the partner’s SSO service.
- The partner decodes the SAML request and
authenticates the user.
- The partner generates a SAML response that
contains the authenticated user's username. In
accordance with the SAML 2.0 specification,
this response is digitally signed with the
partner's public and private DSA/RSA keys.
SAML Visualized:
How It All Fits
Together
(cont’d)
Image Source: Google
PART 3:
THE BIG PICTURE -- IS SAML RIGHT FOR YOU?
GIGYA.COM | 16
Companies are collecting volumes of first-party data for product, marketing, business development,
and support initiatives. To be action-oriented in creating a high-impact user experience and making a
monetization plan, this data needs to be organized into a framework that supports scalable processes
-- to break down identity silos and create a consolidated customer profile.
Adding Structure to Data
SAML can help bind social and
other unstructured profile data with
internal profile data attributes via a
trusted connection. This structured
approach to organizing, analyzing,
and using data provides the input
to build predictive analytic
capabilities, web personalization
models, and marketing automation
systems.
Over 2.5 exabytes of data are created every single
day (HBR).
More than 90% of social media data is unstructured
(BusinessInsider).
90% of all the data in the world has been created in
the last two years (IBM).
GIGYA.COM | 17
Enterprise organizations are targets for security breaches that could
put them and their consumers at risk. Your identity management
strategy needs to create an extremely secure environment for your
businesses and your customers.
SAML requires both the IdP and relying party to register with one
another. The two sides exchange encryption keys and the SAML
request-response sequence can be signed and validated. This is the
most secure verification process available, as the two systems (1)
know about each other and are (2) talking to each other directly.
Addressing Security Risks
A solution like OpenID, for example, allows a relying party to request authentication from an IdP
without prior registration and is used for public authentication. It’s less secure than SAML.
For this reason, SAML is the ideal option for consumer-facing enterprise organizations and companies
-- like banks, for instance -- that are looking to engage in secure transactions.
GIGYA.COM | 18
SAML’s strongest benefit is also its biggest challenge.
SAML is much more elaborate than other solutions like OpenID and requires careful pre-planning -- it
is much more time consuming to implement than other solutions. You have to configure the sender
and the recipient and determine the data structure for your assertion document upfront.
The Balancing Act of Planning
The challenge with SAML is that, in order to make your system work, you have to configure your
endpoint configuration as well as the configuration of the sender and receiver. Your system needs to be
compatible with the SSO standard, and you’ll need an interface that accommodates your end users.
GIGYA.COM | 19
Gigya's Customer Identity Management Platform allows companies to collect, consolidate, and
manage first party customer data in the cloud, developing an end-to-end customer identity data
management strategy built for today’s variety of channels, devices and data.
With the ability to serve as a SAML service provider or identity provider, as well as function as the
service provider for social login and any OpenID identity provider, Gigya can help your business
choose and implement an SSO standard that meets your business goals.
Where Gigya Fits In
ABOUT GIGYA
Gigya's Customer Identity Management Platform helps companies build better customer relationships by turning
unknown visitors into known, loyal and engaged customers. With Gigya’s technology, businesses increase registrations
and identify customers across devices, consolidate data into rich customer profiles, and provide better service, products
and experiences by integrating data into marketing and service applications.
Gigya's platform was designed from the ground up for social identities, mobile devices, consumer privacy and modern
marketing. Gigya provides developers with the APIs they need to easily build and maintain secure and scalable
registration, authentication, profile management, data analytics and third-party integrations.
More than 700 of the world’s leading businesses such as Fox, Forbes, and Verizon rely on Gigya to build identity-driven
relationships and to provide scalable, secure Customer Identity Management.
For more details about Gigya, visit www.gigya.com.
© 2014 Gigya Incorporated. All rights reserved.
Gigya, the Gigya logo, and Customer Identity Management Platform are either registered trademarks or trademarks of Gigya Incorporated in
the United States and/or other countries. All other trademarks are the property of their respective owners.
Gigya does not own any end user data or maintain any other rights to this data, other than utilizing it to make Gigya's services available to our
clients and their end users. Gigya acts as an agent or back-end vendor of its client's website or mobile application, to which the end user of
our client granted permissions (if applicable). Gigya facilitates the collection, transfer and storage of end user data solely on behalf of its
clients and at its clients' direction. For more information, please see Gigya's Privacy Policy, available at http://www.gigya.com/privacy-policy/.
To learn how Gigya can help provide you with the tools and technology needed to develop a successful
SAML strategy, visit gigya.com, or call us at 888.660.1469.

More Related Content

What's hot

비동기 어플리케이션 모니터링과 밀당하기
비동기 어플리케이션 모니터링과 밀당하기비동기 어플리케이션 모니터링과 밀당하기
비동기 어플리케이션 모니터링과 밀당하기GunHee Lee
 
Technical Essentials Training: AWS Innovate Ottawa
Technical Essentials Training: AWS Innovate OttawaTechnical Essentials Training: AWS Innovate Ottawa
Technical Essentials Training: AWS Innovate OttawaAmazon Web Services
 
Cloud Computing and AWS services.pptx
Cloud Computing and AWS services.pptxCloud Computing and AWS services.pptx
Cloud Computing and AWS services.pptxVaibhav Kumar Singh
 
SharePointとAzure Functionsを組み合わせた マルチクラウドなサーバーレスアーキテクチャの展開方法 Japan share poin...
SharePointとAzure Functionsを組み合わせた マルチクラウドなサーバーレスアーキテクチャの展開方法 Japan share poin...SharePointとAzure Functionsを組み合わせた マルチクラウドなサーバーレスアーキテクチャの展開方法 Japan share poin...
SharePointとAzure Functionsを組み合わせた マルチクラウドなサーバーレスアーキテクチャの展開方法 Japan share poin...Kazuya Sugimoto
 
DevOpsに求められる様々な技術とその連携の学習方法
DevOpsに求められる様々な技術とその連携の学習方法DevOpsに求められる様々な技術とその連携の学習方法
DevOpsに求められる様々な技術とその連携の学習方法CASAREAL, Inc.
 
Lambda를 활용한 서버없는 아키텍쳐 구현하기 :: 김기완 :: AWS Summit Seoul 2016
Lambda를 활용한 서버없는 아키텍쳐 구현하기 :: 김기완 :: AWS Summit Seoul 2016Lambda를 활용한 서버없는 아키텍쳐 구현하기 :: 김기완 :: AWS Summit Seoul 2016
Lambda를 활용한 서버없는 아키텍쳐 구현하기 :: 김기완 :: AWS Summit Seoul 2016Amazon Web Services Korea
 
Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016
Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016
Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016Amazon Web Services
 
CI/CD Pipeline Security: Advanced Continuous Delivery Best Practices: Securit...
CI/CD Pipeline Security: Advanced Continuous Delivery Best Practices: Securit...CI/CD Pipeline Security: Advanced Continuous Delivery Best Practices: Securit...
CI/CD Pipeline Security: Advanced Continuous Delivery Best Practices: Securit...Amazon Web Services
 
소프트웨어 개발 트랜드 및 MSA (마이크로 서비스 아키텍쳐)의 이해
소프트웨어 개발 트랜드 및 MSA (마이크로 서비스 아키텍쳐)의 이해소프트웨어 개발 트랜드 및 MSA (마이크로 서비스 아키텍쳐)의 이해
소프트웨어 개발 트랜드 및 MSA (마이크로 서비스 아키텍쳐)의 이해Terry Cho
 
Introduction to AWS IoT Greengrass - SVC305 - Chicago AWS Summit
Introduction to AWS IoT Greengrass - SVC305 - Chicago AWS SummitIntroduction to AWS IoT Greengrass - SVC305 - Chicago AWS Summit
Introduction to AWS IoT Greengrass - SVC305 - Chicago AWS SummitAmazon Web Services
 
컴퓨팅 분야 신규 서비스 - 조상만, AWS 솔루션즈 아키텍트 :: AWS re:Invent re:Cap 2021
컴퓨팅 분야 신규 서비스 - 조상만, AWS 솔루션즈 아키텍트 :: AWS re:Invent re:Cap 2021컴퓨팅 분야 신규 서비스 - 조상만, AWS 솔루션즈 아키텍트 :: AWS re:Invent re:Cap 2021
컴퓨팅 분야 신규 서비스 - 조상만, AWS 솔루션즈 아키텍트 :: AWS re:Invent re:Cap 2021Amazon Web Services Korea
 
HSBC and AWS Day - AWS foundations
HSBC and AWS Day - AWS foundationsHSBC and AWS Day - AWS foundations
HSBC and AWS Day - AWS foundationsAmazon Web Services
 
Getting Started with Cognito User Pools - September Webinar Series
Getting Started with Cognito User Pools - September Webinar SeriesGetting Started with Cognito User Pools - September Webinar Series
Getting Started with Cognito User Pools - September Webinar SeriesAmazon Web Services
 
Deep Dive on Amazon Cognito - March 2017 AWS Online Tech Talks
Deep Dive on Amazon Cognito - March 2017 AWS Online Tech TalksDeep Dive on Amazon Cognito - March 2017 AWS Online Tech Talks
Deep Dive on Amazon Cognito - March 2017 AWS Online Tech TalksAmazon Web Services
 
클라우드로 데이터 센터 확장하기 : 하이브리드 환경을 위한 연결 옵션 및 고려사항::강동환::AWS Summit Seoul 2018
클라우드로 데이터 센터 확장하기 : 하이브리드 환경을 위한 연결 옵션 및 고려사항::강동환::AWS Summit Seoul 2018 클라우드로 데이터 센터 확장하기 : 하이브리드 환경을 위한 연결 옵션 및 고려사항::강동환::AWS Summit Seoul 2018
클라우드로 데이터 센터 확장하기 : 하이브리드 환경을 위한 연결 옵션 및 고려사항::강동환::AWS Summit Seoul 2018 Amazon Web Services Korea
 
Reinforcement Learning with Sagemaker, DeepRacer and Robomaker
Reinforcement Learning with Sagemaker, DeepRacer and RobomakerReinforcement Learning with Sagemaker, DeepRacer and Robomaker
Reinforcement Learning with Sagemaker, DeepRacer and RobomakerAlex Barbosa Coqueiro
 

What's hot (20)

비동기 어플리케이션 모니터링과 밀당하기
비동기 어플리케이션 모니터링과 밀당하기비동기 어플리케이션 모니터링과 밀당하기
비동기 어플리케이션 모니터링과 밀당하기
 
Technical Essentials Training: AWS Innovate Ottawa
Technical Essentials Training: AWS Innovate OttawaTechnical Essentials Training: AWS Innovate Ottawa
Technical Essentials Training: AWS Innovate Ottawa
 
Cloud Computing and AWS services.pptx
Cloud Computing and AWS services.pptxCloud Computing and AWS services.pptx
Cloud Computing and AWS services.pptx
 
SharePointとAzure Functionsを組み合わせた マルチクラウドなサーバーレスアーキテクチャの展開方法 Japan share poin...
SharePointとAzure Functionsを組み合わせた マルチクラウドなサーバーレスアーキテクチャの展開方法 Japan share poin...SharePointとAzure Functionsを組み合わせた マルチクラウドなサーバーレスアーキテクチャの展開方法 Japan share poin...
SharePointとAzure Functionsを組み合わせた マルチクラウドなサーバーレスアーキテクチャの展開方法 Japan share poin...
 
DevOpsに求められる様々な技術とその連携の学習方法
DevOpsに求められる様々な技術とその連携の学習方法DevOpsに求められる様々な技術とその連携の学習方法
DevOpsに求められる様々な技術とその連携の学習方法
 
Concept of SOA
Concept of SOAConcept of SOA
Concept of SOA
 
Lambda를 활용한 서버없는 아키텍쳐 구현하기 :: 김기완 :: AWS Summit Seoul 2016
Lambda를 활용한 서버없는 아키텍쳐 구현하기 :: 김기완 :: AWS Summit Seoul 2016Lambda를 활용한 서버없는 아키텍쳐 구현하기 :: 김기완 :: AWS Summit Seoul 2016
Lambda를 활용한 서버없는 아키텍쳐 구현하기 :: 김기완 :: AWS Summit Seoul 2016
 
Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016
Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016
Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016
 
CI/CD Pipeline Security: Advanced Continuous Delivery Best Practices: Securit...
CI/CD Pipeline Security: Advanced Continuous Delivery Best Practices: Securit...CI/CD Pipeline Security: Advanced Continuous Delivery Best Practices: Securit...
CI/CD Pipeline Security: Advanced Continuous Delivery Best Practices: Securit...
 
소프트웨어 개발 트랜드 및 MSA (마이크로 서비스 아키텍쳐)의 이해
소프트웨어 개발 트랜드 및 MSA (마이크로 서비스 아키텍쳐)의 이해소프트웨어 개발 트랜드 및 MSA (마이크로 서비스 아키텍쳐)의 이해
소프트웨어 개발 트랜드 및 MSA (마이크로 서비스 아키텍쳐)의 이해
 
Introduction to AWS IoT Greengrass - SVC305 - Chicago AWS Summit
Introduction to AWS IoT Greengrass - SVC305 - Chicago AWS SummitIntroduction to AWS IoT Greengrass - SVC305 - Chicago AWS Summit
Introduction to AWS IoT Greengrass - SVC305 - Chicago AWS Summit
 
SOA Case Study
SOA Case StudySOA Case Study
SOA Case Study
 
컴퓨팅 분야 신규 서비스 - 조상만, AWS 솔루션즈 아키텍트 :: AWS re:Invent re:Cap 2021
컴퓨팅 분야 신규 서비스 - 조상만, AWS 솔루션즈 아키텍트 :: AWS re:Invent re:Cap 2021컴퓨팅 분야 신규 서비스 - 조상만, AWS 솔루션즈 아키텍트 :: AWS re:Invent re:Cap 2021
컴퓨팅 분야 신규 서비스 - 조상만, AWS 솔루션즈 아키텍트 :: AWS re:Invent re:Cap 2021
 
HSBC and AWS Day - AWS foundations
HSBC and AWS Day - AWS foundationsHSBC and AWS Day - AWS foundations
HSBC and AWS Day - AWS foundations
 
Introduction to AWS IoT
Introduction to AWS IoTIntroduction to AWS IoT
Introduction to AWS IoT
 
Getting Started with Cognito User Pools - September Webinar Series
Getting Started with Cognito User Pools - September Webinar SeriesGetting Started with Cognito User Pools - September Webinar Series
Getting Started with Cognito User Pools - September Webinar Series
 
Deep Dive on Amazon Cognito - March 2017 AWS Online Tech Talks
Deep Dive on Amazon Cognito - March 2017 AWS Online Tech TalksDeep Dive on Amazon Cognito - March 2017 AWS Online Tech Talks
Deep Dive on Amazon Cognito - March 2017 AWS Online Tech Talks
 
Introduction to Amazon EC2
Introduction to Amazon EC2Introduction to Amazon EC2
Introduction to Amazon EC2
 
클라우드로 데이터 센터 확장하기 : 하이브리드 환경을 위한 연결 옵션 및 고려사항::강동환::AWS Summit Seoul 2018
클라우드로 데이터 센터 확장하기 : 하이브리드 환경을 위한 연결 옵션 및 고려사항::강동환::AWS Summit Seoul 2018 클라우드로 데이터 센터 확장하기 : 하이브리드 환경을 위한 연결 옵션 및 고려사항::강동환::AWS Summit Seoul 2018
클라우드로 데이터 센터 확장하기 : 하이브리드 환경을 위한 연결 옵션 및 고려사항::강동환::AWS Summit Seoul 2018
 
Reinforcement Learning with Sagemaker, DeepRacer and Robomaker
Reinforcement Learning with Sagemaker, DeepRacer and RobomakerReinforcement Learning with Sagemaker, DeepRacer and Robomaker
Reinforcement Learning with Sagemaker, DeepRacer and Robomaker
 

Viewers also liked

White Paper: Internal vs. External Identity Access Management
White Paper: Internal vs. External Identity Access Management White Paper: Internal vs. External Identity Access Management
White Paper: Internal vs. External Identity Access Management Gigya
 
Introduction to SAML 2.0
Introduction to SAML 2.0Introduction to SAML 2.0
Introduction to SAML 2.0Mika Koivisto
 
SAML Protocol Overview
SAML Protocol OverviewSAML Protocol Overview
SAML Protocol OverviewMike Schwartz
 
Saml vs Oauth : Which one should I use?
Saml vs Oauth : Which one should I use?Saml vs Oauth : Which one should I use?
Saml vs Oauth : Which one should I use?Anil Saldanha
 
Simplifying The S's: Single Sign-On, SPNEGO and SAML
Simplifying The S's: Single Sign-On, SPNEGO and SAMLSimplifying The S's: Single Sign-On, SPNEGO and SAML
Simplifying The S's: Single Sign-On, SPNEGO and SAMLGabriella Davis
 
RMLL 2013 - The SAML Protocol: Single Sign On for skilled people
RMLL 2013 - The SAML Protocol: Single Sign On for skilled peopleRMLL 2013 - The SAML Protocol: Single Sign On for skilled people
RMLL 2013 - The SAML Protocol: Single Sign On for skilled peopleClément OUDOT
 
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6Kenneth Peeples
 
LDAP, SAML and Hue
LDAP, SAML and HueLDAP, SAML and Hue
LDAP, SAML and Huegethue
 
Token Authentication for Java Applications
Token Authentication for Java ApplicationsToken Authentication for Java Applications
Token Authentication for Java ApplicationsStormpath
 
SAML and Other Types of Federation for Your Enterprise
SAML and Other Types of Federation for Your EnterpriseSAML and Other Types of Federation for Your Enterprise
SAML and Other Types of Federation for Your EnterpriseDenis Gundarev
 
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-onFast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-onCraig Dickson
 
White Paper: The Evolution of Consumer Identity: 10 Predictions for 2015
White Paper: The Evolution of Consumer Identity: 10 Predictions for 2015White Paper: The Evolution of Consumer Identity: 10 Predictions for 2015
White Paper: The Evolution of Consumer Identity: 10 Predictions for 2015Gigya
 
Digital Fuel & Forrester Cloud Computing IT Financial Management
Digital Fuel & Forrester Cloud  Computing IT Financial ManagementDigital Fuel & Forrester Cloud  Computing IT Financial Management
Digital Fuel & Forrester Cloud Computing IT Financial Managementyisbat
 
Ahmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threatAhmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threatnooralmousa
 

Viewers also liked (20)

White Paper: Internal vs. External Identity Access Management
White Paper: Internal vs. External Identity Access Management White Paper: Internal vs. External Identity Access Management
White Paper: Internal vs. External Identity Access Management
 
Introduction to SAML 2.0
Introduction to SAML 2.0Introduction to SAML 2.0
Introduction to SAML 2.0
 
SAML Smackdown
SAML SmackdownSAML Smackdown
SAML Smackdown
 
SAML Protocol Overview
SAML Protocol OverviewSAML Protocol Overview
SAML Protocol Overview
 
IdP, SAML, OAuth
IdP, SAML, OAuthIdP, SAML, OAuth
IdP, SAML, OAuth
 
Saml vs Oauth : Which one should I use?
Saml vs Oauth : Which one should I use?Saml vs Oauth : Which one should I use?
Saml vs Oauth : Which one should I use?
 
Simplifying The S's: Single Sign-On, SPNEGO and SAML
Simplifying The S's: Single Sign-On, SPNEGO and SAMLSimplifying The S's: Single Sign-On, SPNEGO and SAML
Simplifying The S's: Single Sign-On, SPNEGO and SAML
 
RMLL 2013 - The SAML Protocol: Single Sign On for skilled people
RMLL 2013 - The SAML Protocol: Single Sign On for skilled peopleRMLL 2013 - The SAML Protocol: Single Sign On for skilled people
RMLL 2013 - The SAML Protocol: Single Sign On for skilled people
 
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6
 
LDAP, SAML and Hue
LDAP, SAML and HueLDAP, SAML and Hue
LDAP, SAML and Hue
 
Saml in cloud
Saml in cloudSaml in cloud
Saml in cloud
 
Token Authentication for Java Applications
Token Authentication for Java ApplicationsToken Authentication for Java Applications
Token Authentication for Java Applications
 
SAML and Other Types of Federation for Your Enterprise
SAML and Other Types of Federation for Your EnterpriseSAML and Other Types of Federation for Your Enterprise
SAML and Other Types of Federation for Your Enterprise
 
Introduction to SAML
Introduction to SAMLIntroduction to SAML
Introduction to SAML
 
Single sign on using SAML
Single sign on using SAML Single sign on using SAML
Single sign on using SAML
 
Single Sign On 101
Single Sign On 101Single Sign On 101
Single Sign On 101
 
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-onFast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
 
White Paper: The Evolution of Consumer Identity: 10 Predictions for 2015
White Paper: The Evolution of Consumer Identity: 10 Predictions for 2015White Paper: The Evolution of Consumer Identity: 10 Predictions for 2015
White Paper: The Evolution of Consumer Identity: 10 Predictions for 2015
 
Digital Fuel & Forrester Cloud Computing IT Financial Management
Digital Fuel & Forrester Cloud  Computing IT Financial ManagementDigital Fuel & Forrester Cloud  Computing IT Financial Management
Digital Fuel & Forrester Cloud Computing IT Financial Management
 
Ahmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threatAhmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threat
 

Similar to How SAML Enables Secure Customer Identity Management

White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyWhite Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyGigya
 
Internal vs. external identity access management
Internal vs. external identity access managementInternal vs. external identity access management
Internal vs. external identity access managementTatiana Grisham
 
White Paper: DIY vs CIAM
White Paper: DIY vs CIAMWhite Paper: DIY vs CIAM
White Paper: DIY vs CIAMGigya
 
SAML Executive Overview
SAML Executive OverviewSAML Executive Overview
SAML Executive OverviewPortalGuard
 
Data Sheet: Why Your eCommerce Platform Needs CIAM
Data Sheet: Why Your eCommerce Platform Needs CIAMData Sheet: Why Your eCommerce Platform Needs CIAM
Data Sheet: Why Your eCommerce Platform Needs CIAMGigya
 
Implementing information federation
Implementing information federationImplementing information federation
Implementing information federationCory Casanave
 
Week 4 power point slide -1-case study 1-customer relationship....salesforce
Week 4  power point slide -1-case study 1-customer relationship....salesforceWeek 4  power point slide -1-case study 1-customer relationship....salesforce
Week 4 power point slide -1-case study 1-customer relationship....salesforceZulkifflee Sofee
 
Week 4 power point slide -1-case study 1-customer relationship....salesforce
Week 4  power point slide -1-case study 1-customer relationship....salesforceWeek 4  power point slide -1-case study 1-customer relationship....salesforce
Week 4 power point slide -1-case study 1-customer relationship....salesforceZulkifflee Sofee
 
Choosing the-best-crm-for-your-organization
Choosing the-best-crm-for-your-organizationChoosing the-best-crm-for-your-organization
Choosing the-best-crm-for-your-organizationSomayeh Jabbari
 
Exploring SAML 2.0-based federation in AWS.pptx
Exploring SAML 2.0-based federation in AWS.pptxExploring SAML 2.0-based federation in AWS.pptx
Exploring SAML 2.0-based federation in AWS.pptxInfosectrain3
 
Exploring SAML 2.0-based federation in AWS.pptx
Exploring SAML 2.0-based federation in AWS.pptxExploring SAML 2.0-based federation in AWS.pptx
Exploring SAML 2.0-based federation in AWS.pptxinfosec train
 
The software Visibility Problem
The software Visibility Problem The software Visibility Problem
The software Visibility Problem Jade Global
 
Industry Report: The State of Customer Data Integration in 2013
Industry Report: The State of Customer Data Integration in 2013Industry Report: The State of Customer Data Integration in 2013
Industry Report: The State of Customer Data Integration in 2013Scribe Software Corp.
 
Graduation Project Presentation
Graduation Project PresentationGraduation Project Presentation
Graduation Project Presentationsameh samir
 
Top cloud CRM overview. Part 1 - Choosing the right CRM solution
Top cloud CRM overview. Part 1 - Choosing the right CRM solutionTop cloud CRM overview. Part 1 - Choosing the right CRM solution
Top cloud CRM overview. Part 1 - Choosing the right CRM solutionEugene Zozulya
 
GM and IT
GM and ITGM and IT
GM and ITsam ran
 
Cloud forum 2011 s poulley keynote v10
Cloud forum 2011 s poulley keynote v10Cloud forum 2011 s poulley keynote v10
Cloud forum 2011 s poulley keynote v10Mauricio Godoy
 
Cloud forum 2011 s poulley keynote v10
Cloud forum 2011 s poulley keynote v10Cloud forum 2011 s poulley keynote v10
Cloud forum 2011 s poulley keynote v10Mauricio Godoy
 

Similar to How SAML Enables Secure Customer Identity Management (20)

White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyWhite Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
 
Internal vs. external identity access management
Internal vs. external identity access managementInternal vs. external identity access management
Internal vs. external identity access management
 
White Paper: DIY vs CIAM
White Paper: DIY vs CIAMWhite Paper: DIY vs CIAM
White Paper: DIY vs CIAM
 
SAML 101
SAML 101SAML 101
SAML 101
 
SAML Executive Overview
SAML Executive OverviewSAML Executive Overview
SAML Executive Overview
 
Data Sheet: Why Your eCommerce Platform Needs CIAM
Data Sheet: Why Your eCommerce Platform Needs CIAMData Sheet: Why Your eCommerce Platform Needs CIAM
Data Sheet: Why Your eCommerce Platform Needs CIAM
 
Implementing information federation
Implementing information federationImplementing information federation
Implementing information federation
 
Week 4 power point slide -1-case study 1-customer relationship....salesforce
Week 4  power point slide -1-case study 1-customer relationship....salesforceWeek 4  power point slide -1-case study 1-customer relationship....salesforce
Week 4 power point slide -1-case study 1-customer relationship....salesforce
 
Week 4 power point slide -1-case study 1-customer relationship....salesforce
Week 4  power point slide -1-case study 1-customer relationship....salesforceWeek 4  power point slide -1-case study 1-customer relationship....salesforce
Week 4 power point slide -1-case study 1-customer relationship....salesforce
 
Choosing the-best-crm-for-your-organization
Choosing the-best-crm-for-your-organizationChoosing the-best-crm-for-your-organization
Choosing the-best-crm-for-your-organization
 
Exploring SAML 2.0-based federation in AWS.pptx
Exploring SAML 2.0-based federation in AWS.pptxExploring SAML 2.0-based federation in AWS.pptx
Exploring SAML 2.0-based federation in AWS.pptx
 
Exploring SAML 2.0-based federation in AWS.pptx
Exploring SAML 2.0-based federation in AWS.pptxExploring SAML 2.0-based federation in AWS.pptx
Exploring SAML 2.0-based federation in AWS.pptx
 
The software Visibility Problem
The software Visibility Problem The software Visibility Problem
The software Visibility Problem
 
Industry Report: The State of Customer Data Integration in 2013
Industry Report: The State of Customer Data Integration in 2013Industry Report: The State of Customer Data Integration in 2013
Industry Report: The State of Customer Data Integration in 2013
 
Graduation Project Presentation
Graduation Project PresentationGraduation Project Presentation
Graduation Project Presentation
 
Top cloud CRM overview. Part 1 - Choosing the right CRM solution
Top cloud CRM overview. Part 1 - Choosing the right CRM solutionTop cloud CRM overview. Part 1 - Choosing the right CRM solution
Top cloud CRM overview. Part 1 - Choosing the right CRM solution
 
Basic concepts
Basic conceptsBasic concepts
Basic concepts
 
GM and IT
GM and ITGM and IT
GM and IT
 
Cloud forum 2011 s poulley keynote v10
Cloud forum 2011 s poulley keynote v10Cloud forum 2011 s poulley keynote v10
Cloud forum 2011 s poulley keynote v10
 
Cloud forum 2011 s poulley keynote v10
Cloud forum 2011 s poulley keynote v10Cloud forum 2011 s poulley keynote v10
Cloud forum 2011 s poulley keynote v10
 

More from Gigya

Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...Gigya
 
Case Study: STV Boosts Viewer Engagement and Campaign Yields with Gigya
Case Study: STV Boosts Viewer Engagement and Campaign Yields with GigyaCase Study: STV Boosts Viewer Engagement and Campaign Yields with Gigya
Case Study: STV Boosts Viewer Engagement and Campaign Yields with GigyaGigya
 
White Paper: Gigya's Information Security and Data Privacy Practices
White Paper: Gigya's Information Security and Data Privacy PracticesWhite Paper: Gigya's Information Security and Data Privacy Practices
White Paper: Gigya's Information Security and Data Privacy PracticesGigya
 
Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...
Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...
Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...Gigya
 
Gigya's China Data Center - Data Sheet
Gigya's China Data Center - Data SheetGigya's China Data Center - Data Sheet
Gigya's China Data Center - Data SheetGigya
 
The Chutes and Ladders of Customer Identity
The Chutes and Ladders of Customer IdentityThe Chutes and Ladders of Customer Identity
The Chutes and Ladders of Customer IdentityGigya
 
Data Sheet: Gigya and Global Regulatory Compliance
Data Sheet: Gigya and Global Regulatory ComplianceData Sheet: Gigya and Global Regulatory Compliance
Data Sheet: Gigya and Global Regulatory ComplianceGigya
 
White Paper: 2017 Predictions - French
White Paper: 2017 Predictions - FrenchWhite Paper: 2017 Predictions - French
White Paper: 2017 Predictions - FrenchGigya
 
White Paper: 2017 Predictions - German
White Paper: 2017 Predictions - GermanWhite Paper: 2017 Predictions - German
White Paper: 2017 Predictions - GermanGigya
 
Case study - American Kennel Club
Case study - American Kennel ClubCase study - American Kennel Club
Case study - American Kennel ClubGigya
 
Data Sheet: Corporate Overview
Data Sheet: Corporate OverviewData Sheet: Corporate Overview
Data Sheet: Corporate OverviewGigya
 
Gigya Infographic - Death Of A Password
Gigya Infographic - Death Of A PasswordGigya Infographic - Death Of A Password
Gigya Infographic - Death Of A PasswordGigya
 
GDPR Implications Customer Identity Management - German
GDPR Implications Customer Identity Management - GermanGDPR Implications Customer Identity Management - German
GDPR Implications Customer Identity Management - GermanGigya
 
White Paper: Managing consumer data privacy with Gigya (German)
White Paper: Managing consumer data privacy with Gigya (German)White Paper: Managing consumer data privacy with Gigya (German)
White Paper: Managing consumer data privacy with Gigya (German)Gigya
 
White Paper: Managing consumer data privacy with Gigya (French)
White Paper: Managing consumer data privacy with Gigya (French)White Paper: Managing consumer data privacy with Gigya (French)
White Paper: Managing consumer data privacy with Gigya (French)Gigya
 
Case Study: International CPG Company
Case Study: International CPG CompanyCase Study: International CPG Company
Case Study: International CPG CompanyGigya
 
Case Study: Travel and Hospitality Company
Case Study: Travel and Hospitality CompanyCase Study: Travel and Hospitality Company
Case Study: Travel and Hospitality CompanyGigya
 
Case Study: Enterprise Media Company
Case Study: Enterprise Media CompanyCase Study: Enterprise Media Company
Case Study: Enterprise Media CompanyGigya
 
Case Study: Large Enterprise eCommerce Company
Case Study: Large Enterprise eCommerce CompanyCase Study: Large Enterprise eCommerce Company
Case Study: Large Enterprise eCommerce CompanyGigya
 
Gigya Corporate Overview - French Edition
Gigya Corporate Overview - French EditionGigya Corporate Overview - French Edition
Gigya Corporate Overview - French EditionGigya
 

More from Gigya (20)

Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
 
Case Study: STV Boosts Viewer Engagement and Campaign Yields with Gigya
Case Study: STV Boosts Viewer Engagement and Campaign Yields with GigyaCase Study: STV Boosts Viewer Engagement and Campaign Yields with Gigya
Case Study: STV Boosts Viewer Engagement and Campaign Yields with Gigya
 
White Paper: Gigya's Information Security and Data Privacy Practices
White Paper: Gigya's Information Security and Data Privacy PracticesWhite Paper: Gigya's Information Security and Data Privacy Practices
White Paper: Gigya's Information Security and Data Privacy Practices
 
Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...
Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...
Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...
 
Gigya's China Data Center - Data Sheet
Gigya's China Data Center - Data SheetGigya's China Data Center - Data Sheet
Gigya's China Data Center - Data Sheet
 
The Chutes and Ladders of Customer Identity
The Chutes and Ladders of Customer IdentityThe Chutes and Ladders of Customer Identity
The Chutes and Ladders of Customer Identity
 
Data Sheet: Gigya and Global Regulatory Compliance
Data Sheet: Gigya and Global Regulatory ComplianceData Sheet: Gigya and Global Regulatory Compliance
Data Sheet: Gigya and Global Regulatory Compliance
 
White Paper: 2017 Predictions - French
White Paper: 2017 Predictions - FrenchWhite Paper: 2017 Predictions - French
White Paper: 2017 Predictions - French
 
White Paper: 2017 Predictions - German
White Paper: 2017 Predictions - GermanWhite Paper: 2017 Predictions - German
White Paper: 2017 Predictions - German
 
Case study - American Kennel Club
Case study - American Kennel ClubCase study - American Kennel Club
Case study - American Kennel Club
 
Data Sheet: Corporate Overview
Data Sheet: Corporate OverviewData Sheet: Corporate Overview
Data Sheet: Corporate Overview
 
Gigya Infographic - Death Of A Password
Gigya Infographic - Death Of A PasswordGigya Infographic - Death Of A Password
Gigya Infographic - Death Of A Password
 
GDPR Implications Customer Identity Management - German
GDPR Implications Customer Identity Management - GermanGDPR Implications Customer Identity Management - German
GDPR Implications Customer Identity Management - German
 
White Paper: Managing consumer data privacy with Gigya (German)
White Paper: Managing consumer data privacy with Gigya (German)White Paper: Managing consumer data privacy with Gigya (German)
White Paper: Managing consumer data privacy with Gigya (German)
 
White Paper: Managing consumer data privacy with Gigya (French)
White Paper: Managing consumer data privacy with Gigya (French)White Paper: Managing consumer data privacy with Gigya (French)
White Paper: Managing consumer data privacy with Gigya (French)
 
Case Study: International CPG Company
Case Study: International CPG CompanyCase Study: International CPG Company
Case Study: International CPG Company
 
Case Study: Travel and Hospitality Company
Case Study: Travel and Hospitality CompanyCase Study: Travel and Hospitality Company
Case Study: Travel and Hospitality Company
 
Case Study: Enterprise Media Company
Case Study: Enterprise Media CompanyCase Study: Enterprise Media Company
Case Study: Enterprise Media Company
 
Case Study: Large Enterprise eCommerce Company
Case Study: Large Enterprise eCommerce CompanyCase Study: Large Enterprise eCommerce Company
Case Study: Large Enterprise eCommerce Company
 
Gigya Corporate Overview - French Edition
Gigya Corporate Overview - French EditionGigya Corporate Overview - French Edition
Gigya Corporate Overview - French Edition
 

Recently uploaded

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 

Recently uploaded (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 

How SAML Enables Secure Customer Identity Management

  • 1. SAML AS AN SSO STANDARD FOR CUSTOMER IDENTITY MANAGEMENT How to Create a Frictionless, Secure Customer Identity Management Strategy
  • 2. PART 1: WHAT IS SAML?
  • 3. GIGYA.COM | 3 SAML in Context Security Assertion Markup Language (SAML) is an Extensible Markup Language (XML) standard that enables secure websites and services to exchange user authentication data. SAML-based single sign-on (SSO) standards are designed to create frictionless identity verification and management processes between separate yet affiliated systems. Dating back to 2001, SAML has evolved to support a range of identity federation and management needs. Some of today’s most popular third-party web applications such as Google Apps, Zendesk, and Salesforce use SAML to authenticate users. The end goals? Simplify data management. Streamline user flows. Keep customers engaged with your company. 54 percent of companies have difficulty managing and integrating data from today’s many varied sources, while 50 percent are concerned about consistent data quality (Destination CRM).
  • 4. GIGYA.COM | 4 SAML has developed a reputation as a solution for employee management for IT teams within nonprofit, government, small business, and enterprise organizations. Internally, organizations use SAML as an SSO service to manage employee, partner and contractor access to network-based applications. But the applications of SAML extend much further. Exploring Use Cases Within the past 5-10 years, the rise of ecommerce, social 
 networks, mobile and connected devices has created 
 the need for businesses to develop an external identity 
 access management (IAM) strategy to keep up 
 with the flood of identity data being created as 
 customers connect across channels.
  • 5. GIGYA.COM | 5 Where SAML stands out from other authentication mechanisms is that it allows businesses to identify who users are and communicate information about them. Businesses can add structure to disparate user data to tell a rich, compelling story about each user profile. Below is a hypothetical example for how a membership-only television site can use SAML to better understand and track their customers. How SAML Stands Out SAML: Authorization & Authentication Other Authentication Standards for Enterprise SSO Name: Emily Smith Job Title: Manager at tech company Gender: Female Level of Membership: Platinum Date Joined: 2009 Interest 1: Travel Interest 2: Documentaries Interest 3: Stand Up Comedy User has permission to access features: Yes Name: Emily Smith Email Address: emilysmith@testemail.com
  • 6. GIGYA.COM | 6 Enterprise organizations rely on multiple service providers -- such as customer support and payment processing software -- to support core user experience goals. Companies will also often team up, through strategic partnership initiatives, to introduce new products and services to shared customer bases. SAML in Action SAML creates a structured, secure, and scalable process to integrate data between these web applications and authentication processes.
  • 7. GIGYA.COM | 7 Comcast XFINITY customers can stream content online. Comcast uses SAML to authenticate users, and then to provide authorization information regarding whether the user's subscription includes access to Discovery's online video content. Example: Video Subscription Product
  • 8. PART 2: THE TECHNOLOGY
  • 9. GIGYA.COM | 9 Think of SAML as a “handshake with an upgrade.” SAML uses something called an assertion document -- an XML file that connects pieces of information -- between a service provider and an identity provider. In contrast, other standards provide identity management using only strings of text, which allow for only a very basic handshake. SAML’s assertion document is more elaborate and more structured than other standards, making it an ideal identity management solution for enterprise organizations. SAML (1) identifies the user and (2) communicates predefined characteristics about that user. OAuth, in contrast, communicates only an access token, or alpha-numeric string, which can be used to obtain information about the user, but does not provide that information directly. How SAML Works If you want to create an elaborate user profile, you need to go with SAML. Image Source: Salesforce
  • 10. GIGYA.COM | 10 The three SAML components include assertions, protocol, and binding. An assertion is a package of information related to user identity and security. There are three types of SAML assertions: authentication, attribute, and authorization. Authentication assertion is used to validate user identity, attribute assertion contains information about the user, and authorization assertion identifies what the user can do. Components of SAML Type of Assertion Question Asked Example Authentication Who is the user? The user is a valid user. Attribute What do we know about this particular user? The user is male, 34 years old, lives in Nebraska and subscribes to premium channels such as HBO. Authorization Is the user authorized to access this particular membership area or website feature? Comcast subscriber who pays for Discovery Channel access can watch Discovery Channel TV shows on XFINITY SAML protocol refers to how data gets transmitted from the sender to receiver. Sample binding determines how SAML requests map to standard messaging and communications protocols. SAML works with multiple protocols including Hypertext Transfer Protocol (HTTP) Simple Mail Transfer Protocol (SMTP), and File Transfer Protocol (FTP). SAML also supports SOAP, BizTalk, and Electronic Business XML (ebXML). Assertion Examples from Membership Video Site:
  • 11. GIGYA.COM | 11 SAML has a lot of moving parts -- it’s a complex topic that is challenging to grasp. We put together the following ‘cheat sheet’ for you to quickly and consistently reference as needed. SAML Cheat Sheet
  • 13. GIGYA.COM | 13 This diagram explains how an example service provider would verify users with an identity provider. SAML Visualized: How It All Fits Together - User attempts to reach a hosted service or application. - The service or application generates a SAML request, which is encoded and embedded into the URL for the partner’s SSO service. A parameter, set up as an identifier, is passed back without any modification or inspection. Image Source: Google
  • 14. GIGYA.COM | 14 - The application sends a redirect to the user’s browser, which includes the encoded SAML authentication request that should be submitted to the partner’s SSO service. - The partner decodes the SAML request and authenticates the user. - The partner generates a SAML response that contains the authenticated user's username. In accordance with the SAML 2.0 specification, this response is digitally signed with the partner's public and private DSA/RSA keys. SAML Visualized: How It All Fits Together (cont’d) Image Source: Google
  • 15. PART 3: THE BIG PICTURE -- IS SAML RIGHT FOR YOU?
  • 16. GIGYA.COM | 16 Companies are collecting volumes of first-party data for product, marketing, business development, and support initiatives. To be action-oriented in creating a high-impact user experience and making a monetization plan, this data needs to be organized into a framework that supports scalable processes -- to break down identity silos and create a consolidated customer profile. Adding Structure to Data SAML can help bind social and other unstructured profile data with internal profile data attributes via a trusted connection. This structured approach to organizing, analyzing, and using data provides the input to build predictive analytic capabilities, web personalization models, and marketing automation systems. Over 2.5 exabytes of data are created every single day (HBR). More than 90% of social media data is unstructured (BusinessInsider). 90% of all the data in the world has been created in the last two years (IBM).
  • 17. GIGYA.COM | 17 Enterprise organizations are targets for security breaches that could put them and their consumers at risk. Your identity management strategy needs to create an extremely secure environment for your businesses and your customers. SAML requires both the IdP and relying party to register with one another. The two sides exchange encryption keys and the SAML request-response sequence can be signed and validated. This is the most secure verification process available, as the two systems (1) know about each other and are (2) talking to each other directly. Addressing Security Risks A solution like OpenID, for example, allows a relying party to request authentication from an IdP without prior registration and is used for public authentication. It’s less secure than SAML. For this reason, SAML is the ideal option for consumer-facing enterprise organizations and companies -- like banks, for instance -- that are looking to engage in secure transactions.
  • 18. GIGYA.COM | 18 SAML’s strongest benefit is also its biggest challenge. SAML is much more elaborate than other solutions like OpenID and requires careful pre-planning -- it is much more time consuming to implement than other solutions. You have to configure the sender and the recipient and determine the data structure for your assertion document upfront. The Balancing Act of Planning The challenge with SAML is that, in order to make your system work, you have to configure your endpoint configuration as well as the configuration of the sender and receiver. Your system needs to be compatible with the SSO standard, and you’ll need an interface that accommodates your end users.
  • 19. GIGYA.COM | 19 Gigya's Customer Identity Management Platform allows companies to collect, consolidate, and manage first party customer data in the cloud, developing an end-to-end customer identity data management strategy built for today’s variety of channels, devices and data. With the ability to serve as a SAML service provider or identity provider, as well as function as the service provider for social login and any OpenID identity provider, Gigya can help your business choose and implement an SSO standard that meets your business goals. Where Gigya Fits In
  • 20. ABOUT GIGYA Gigya's Customer Identity Management Platform helps companies build better customer relationships by turning unknown visitors into known, loyal and engaged customers. With Gigya’s technology, businesses increase registrations and identify customers across devices, consolidate data into rich customer profiles, and provide better service, products and experiences by integrating data into marketing and service applications. Gigya's platform was designed from the ground up for social identities, mobile devices, consumer privacy and modern marketing. Gigya provides developers with the APIs they need to easily build and maintain secure and scalable registration, authentication, profile management, data analytics and third-party integrations. More than 700 of the world’s leading businesses such as Fox, Forbes, and Verizon rely on Gigya to build identity-driven relationships and to provide scalable, secure Customer Identity Management. For more details about Gigya, visit www.gigya.com. © 2014 Gigya Incorporated. All rights reserved. Gigya, the Gigya logo, and Customer Identity Management Platform are either registered trademarks or trademarks of Gigya Incorporated in the United States and/or other countries. All other trademarks are the property of their respective owners. Gigya does not own any end user data or maintain any other rights to this data, other than utilizing it to make Gigya's services available to our clients and their end users. Gigya acts as an agent or back-end vendor of its client's website or mobile application, to which the end user of our client granted permissions (if applicable). Gigya facilitates the collection, transfer and storage of end user data solely on behalf of its clients and at its clients' direction. For more information, please see Gigya's Privacy Policy, available at http://www.gigya.com/privacy-policy/. To learn how Gigya can help provide you with the tools and technology needed to develop a successful SAML strategy, visit gigya.com, or call us at 888.660.1469.