LINEARSTACK
September 5, 2023

What is SAML?

Components to secure Security Assertion Markup Language (SAML)

SAML, or Security Assertion Markup Language, is a method of authentication that enables the use of a single set of login credentials to access multiple web applications by transferring authentication information between an identity provider and a web application.

Organisations looking to adopt a SAML single, or federated authentication strategy should work with cybersecurity experts like LinearStack. This NewZealand-based cybersecurity and managed security service provider (MSSP) brings years of experience in identity management, multi-factor authentication, and deploying, including monitoring SAML. Their expertise in identity management incorporation SAML 1.1 and 2.0 for enterprise application access follows industry authorization standards and best practices.

Why is SAML Used?

SAML delivers an easier way for users to authenticate websites and web-based applications with a single credential. However, this method of login also has several risks. If a user's credentials become hacked or subject to an identity theft breach, the cybercriminal could log into several of the victim's websites, including banking, travel, and investment accounts. Financial services firms request their customer use separate user or email account authorization credentials to avoid SAML security breaches.

What are the Key Differences Between SAML 1.1 and 2.0?

While both standards are similar, there are some critical distinctions between them. SAML 2.0 offers encryption:

  • XML Encryption—SAML 2.0 uses XML Encryption to provide elements for encrypted attributes, name identifiers, and assertions. SAML 1.1 does not offer encryption. 
  • SAML 2.0 supported federated authentication. 

The Role of SAML Single Sign-On (SSO).

SAML-enabled SSO lets users log in once and access multiple web applications, making it faster and easier.

  • SAML SSO is convenient and secure for users for access to applications. They only need to remember one set of password combinations as credentials and can easily access multiple applications without entering a username and password each time, avoiding password fatigue.
  • SAML SSO reduces costs by improving user productivity and reducing support cases related to assess control. It also eliminates the need for building and maintaining a local authentication implementation.

Components of the SAML Authentication Process.

For SAML to be secure, the organisation must understand all the essential components, including the secure identity provider, assertion, auto decision, protocol, and bindings. Without these elements configured correctly, SAML authentication will become vulnerable to cyber-attacks while simultaneously exploiting several websites and applications. 

 

What is an Identity Provider?

A SAML provider is a system that allows users to access a required service. SAML enables the exchange of identity information between two entities, an identity provider (IdP) and a service provider. (SP)

There are two methods of SAML providers:

  • “The IdP authenticates and transfers the user's identity and authorization level to the SP. The SP then grants access based on the IdP's response.” (Oracle)
  • "The SP requires authentication from the IdP to allow the user, and because both systems use the same language, the user only needs to log in once.” (Oracle)

What is a SAML Assertion?

“ASAML Assertion is an XML file containing user authorization sent from the secure IdP to the SP.” (Varonis)

Organisations have three methods of SAML Assertion functionality: authentication metadata, secure attributes, and authorization decision logic.

  • Authentication assertions confirm user identity, login time, and authentication method. SSO, 2FA, and MFA are logical choices.
  • The attribution assertion sends user information through SAML attributes.
  • The authorization decision determines if the user can access the service or if their request has been denied.

What are SAML Protocols?

SAML has its protocols for system interactions and authentication.

SAML protocols include:

  • The Authentication Request Protocol sends user requests to an IdP for authentication.
  • Single Logout Protocol allows users to quickly and effectively end their active sessions, which is crucial for SSO systems that must end sessions with multiple resources upon user logout.
  • The Artifact Resolution Protocol makes requesting and transmitting SAML protocol messages easier.

How Critical are the HTTP, XML, and SOAP Bindings?

SAML bindings transmit SAML protocol messages for communication between SAML elements. 

SAML bindings depend on several other protocols, including:

  • XML 
  • HTTP Redirect 
  • HTTP Post 
  • HTTP Artifact
  • SOAP

Without SAML bindings, requestors and receivers will not have the means to communicate securely.

“Request binding (communication binding) - this is used for communications between the SP and IdP, including sending the authentication request. (Forge)”

The authentication request is sent through HTTP-Redirect (GET) or HTTP-POST, whereHTTP-Redirect is used by default.

  • Response binding (protocol binding) - This corresponds to the protocol used when returning the response message. 
  • The protocol used can be HTTP-Artifact (default) or HTTP-POST:
  • With HTTP-Artifact, the IdP sends a nonce (a unique number working as a reference) back to the SP, and the SP does a server-to-server communication using that nonce to retrieve the assertion.
  • With HTTP-POST, the IdP sends the assertion back through the user-agent directly.

What are some examples of Use Cases for SAML?

Use Case 1: Vendor Portal Access.

Enterprise identity strategies will often use SAML 2.0 with federated cloud-basedapplications from SaaS providers. Microsoft, Oracle, Cisco Systems, Citrix, and Palo Alto Networks will support SAML 2.0 authentication for the clients to access to their company portal. This strategy simplifies the client user access to the product documentation, open support cases, and purchase additional technology services.

Use Case 2: Device Management and Access.

Another exciting user cases for SAML 2.0 is accessing remote network and security devices, virtual machines in the cloud, and Internet of Things devices. Using SAML authentication, security operations teams, IT operations, and incident response teams can quickly access devices through a single credential pairing. While this simplifies access into the devices, this raises a security concern. If a hacker steals this credential, they would have access to several critical devices within the network and cloud instances. Organisations wanting to avoid this, could restrict access by SAML credential to only devices that user is allowed to connect to.

The Role of the MSSP Supporting SAML 2.0 Strategies.

Deploying any enterprise-wide strategy needs to be carefully planned out. Often organisations that deploy identity solutions end up with duplication efforts and overly expensive point product solutions. Working with cybersecurity consultants like LinearStack, this firm brings comprehensive experience to the enterprise marketplace by understanding the challenges and success factors in delivering a SAML2.0-SSOsolution in a very secure matter.

LinearStack's identity management starts with assessing the current authentication strategies to determine application dependencies and recent user experience. Their identity engagement includes:

  • SAML 2.0 fit-for-purpose solutions based on your risk profile and compliance needs.
  • Role-based access control and design according to the principle of least privilege (POLP).
  • Give the right people access to the correct information across software, networks, and databases.
  • Enabling Zero-trust security to prevent accidental (default) access to restricted areas.
  • Regular     audits to keep your IAM robust and up-to-date and to remove orphaned. 

The firm also delivers award-winning monitoring of identity services, explicitly looking for several attack vectors, including brute force, domain impersonation, and account takeover. 

About LinearStack

LinearStackis a leading Managed Security Service Provider (MSSP) and security systems integrator based in New Zealand. Since our establishment in 2013, we have built a reputation for providing world-class 24x7 security services to businesses of all sizes. We are proud to partner with some of the top technology companies in the industry, such as Palo Alto Networks, Cisco Systems, Imperva, and LogRhythm. Our excellent operational capabilities, as well as our fulfillment of business requirements and completion of rigorous technical, sales enablement, and specialization examinations, have earned us a distinguished reputation in the industry.

At LinearStack, we take pride in providing top-notch security solutions tailored to our client's needs. We aim to help businesses reduce cyber-attack risks, strengthen security posture, and maintain regulatory compliance. Our clients rely on us for our exceptional security solutions, outstanding customer service, and industry expertise.

Culture

We’re100% privately held, grown with a family mindset. When working with clients, we’re well-integrated within their teams and act as an extension of their operations. Augmenting existing teams is a transition we manage smoothly, empowering our customers to prioritize cybersecurity strategy while we protect their business from cyber threats 24x7.

Maintaining thriving IT systems and assuring data protection are fundamental needs that all businesses deserve.

Contact Us

Want to know more about what we offer? We'd love to hear from you.

Get in touch with us today:

Phone: 0800 008 795

Email: info@linearstack.co.nz

Website: https://linearstack.co.nz

Blogs

Start Reading

Our latest blogs and news are here for you

How Effectively Managing Risk Bolsters Cyber Defenses

A well-thought-out cyber risk management strategy can significantly reduce overall risk & strengthen cyber defenses
Read More

How to Achieve Strategic Cyber Risk Management With NIST CSF

A simple yet effective framework to integrate core principles of cyber risk management
Read More

A Deep Dive Into Phishing Scams

Learn the various types of phishing emails & attacks & how to defend against them
Read More
Are you experiencing a security issue? Call us now.