SAML SSO Authentication - Branchi

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

SAML SSO Authentication

Identity Provider (IdP) Web Browser Service Provider (SP)

User tries to access resource


1
3
Validate SAML
Request Sends SAML Request Redirects browser to IDP 2
4
Presents login form to user

Enter credentials &


Validate credentials
submit 5
& generate SAML
Response Post SAML Response to SP 7
Notifies browser to post Checks Authenticity
SAML Response to SP of Response
6 8
Sets authentication cookie
AD
Access the resource as 9
authenticated user

Use
SAML simplifies federated authentication and authorization processes for users, Identity providers, and service
providers. SAML provides a solution to allow your identity provider and service providers to exist separately from each
other, which centralizes user management and provides access to SaaS solutions.

SAML implements a secure method of passing user authentications and authorizations between the identity provider
and service providers. When a user logs into a SAML enabled application, the service provider requests authorization
from the appropriate identity provider. The identity provider authenticates the user’s credentials and then returns the
authorization for the user to the service provider, and the user is now able to use the application.

SAML authentication is the process of verifying the user’s identity and credentials (password, two-factor authentication,
etc.). SAML authorization tells the service provider what access to grant the authenticated user.

Providers
There are two Types of SAML providers
A SAML provider is a system that helps a user access a service they need. There are two primary types of SAML
providers, service provider, and identity provider.

A service provider needs the authentication from the identity provider to grant authorization to the user.
An identity provider performs the authentication that the end user is who they say they are and sends that data to the
service provider along with the user’s access rights for the service.

Microsoft Active Directory or Azure are common identity providers. Salesforce and other CRM solutions are usually
service providers, in that they depend on an identity provider for user authentication.
Assertion
A SAML Assertion is the XML document that the identity provider sends to the service provider that contains the user
authorization. There are three different types of SAML Assertions – authentication, attribute, and authorization decision.
 Authentication assertions prove identification of the user and provide the time the user logged in and what
method of authentication they used (I.e., Kerberos, 2 factor, etc.)
 The attribution assertion passes the SAML attributes to the service provider – SAML attributes are specific
pieces of data that provide information about the user.
 An authorization decision assertion says if the user is authorized to use the service or if the identify provider
denied their request due to a password failure or lack of rights to the service.

Working
SAML works by passing information about users, logins, and attributes between the identity provider and service
providers. Each user logs in once to Single Sign On with the identify provider, and then the identify provider can pass
SAML attributes to the service provider when the user attempts to access those services. The service provider requests
the authorization and authentication from the identify provider. Since both of those systems speak the same language –
SAML – the user only needs to log in once.

Each identity provider and service provider need to agree upon the configuration for SAML. Both ends need to have the
exact configuration for the SAML authentication to work.

Example
1. Ram (user) logs into SSO first thing in the morning.
2. Ram then tries to open the webpage to his Saral ESS.
3. The Saral ESS – the service provider – checks Ram’s credentials with the identity provider (Azure AD).
4. The identity provider sends authorization and authentication messages back to the service provider, which
allows Ram to log into the Saral ESS.
5. Ram can use the Saral ESS and get work done.
http://paytime.matrixvyom.com/
http://se.matrixvyom.com/

You might also like