{"id":21437,"date":"2022-03-26T00:04:29","date_gmt":"2022-03-26T00:04:29","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=21437"},"modified":"2022-07-22T17:00:21","modified_gmt":"2022-07-22T17:00:21","slug":"saml","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/applications\/saml\/","title":{"rendered":"SAML: Still Going Strong After Two Decades"},"content":{"rendered":"\n<p>SAML is an open standard facilitating the communication and verification of credentials between identity providers and service providers for users everywhere.<\/p>\n\n\n\n<p>In 2005, the open standard consortium OASIS released SAML 2.0 to broad appeal. As <a href=\"https:\/\/www.esecurityplanet.com\/mobile\/mobile-security-threats\/\">smart mobile devices<\/a> boomed, so did the number of <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-web-application-firewall-waf-vendors\/\">web applications<\/a> and the need to address never-ending logins. SAML was essential to addressing this challenge and introduced <a href=\"https:\/\/www.esecurityplanet.com\/products\/single-sign-on-solutions\/\">single sign-on<\/a> (SSO) as a reliable tool for individuals up to enterprise organizations. The other most common use of SAML is for federation networks between infrastructure not necessarily linked to web services.<\/p>\n\n\n\n<p>This article looks at the SAML protocol, how it works, the involved parties, and where it fits in the evolution of <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-iam-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">identity and access management<\/a> (IAM).<\/p>\n\n\n\n<p><strong>Table of Contents<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.esecurityplanet.com\/applications\/saml\/#what\">What is SAML?<\/a><\/li><li><a href=\"https:\/\/www.esecurityplanet.com\/applications\/saml\/#spim\">Service Providers and Identity Managers<\/a><\/li><li><a href=\"https:\/\/www.esecurityplanet.com\/applications\/saml\/#how\">How Does SAML Work?<\/a><\/li><li><a href=\"https:\/\/www.esecurityplanet.com\/applications\/saml\/#why\">Why is SAML Important?<\/a><\/li><li><a href=\"https:\/\/www.esecurityplanet.com\/applications\/saml\/#oauth\">OAuth vs SAML<\/a><\/li><li><a href=\"https:\/\/www.esecurityplanet.com\/applications\/saml\/#history\">IAM History: SAML in Context<\/a><\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what\"><strong>What is SAML?<\/strong><\/h2>\n\n\n\n<p>The Security Assertion Markup Language (SAML) manages transactions between web service providers and identity providers using the Extensible Markup Language (XML). These communications on the backend of username and <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-password-managers\/\">password<\/a> login processes ensure users get authenticated by the overarching identity manager and authorized to use the given web service(s).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Context: Authentication vs. Authorization<\/strong><\/h3>\n\n\n\n<p>A foundational piece of the digital access puzzle is the difference between authentication and authorization. <strong>Authentication confirms user identity<\/strong>, and <strong>authorization grants specific rights<\/strong> to a web application, user, or device.<\/p>\n\n\n\n<p><strong>Read more<\/strong>: <a href=\"https:\/\/www.esecurityplanet.com\/products\/privileged-access-management-pam-software\/\">Best Privileged Access Management (PAM) Software<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"spim\"><strong>Service Providers and Identity Managers<\/strong><\/h2>\n\n\n\n<p>Service providers and identity managers play a critical part in the federation process, allowing users access to specific data.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Service Providers<\/strong><\/h3>\n\n\n\n<p>The exponential growth of <a href=\"https:\/\/www.esecurityplanet.com\/products\/application-security-vendors\/\">applications<\/a> serving consumer to enterprise IT needs and wants means a universe of service providers. Service providers are the organizations and web services offered to users through a valid request. Application and <a href=\"https:\/\/www.esecurityplanet.com\/products\/devsecops-tools\/\">software developers<\/a> are responsible for establishing the necessary backend <a href=\"https:\/\/www.esecurityplanet.com\/products\/database-security-tools\/\">database<\/a> and protocol for storing and accepting user account credentials.<\/p>\n\n\n\n<p>Popular service providers include top business application vendors like <a href=\"https:\/\/www.esecurityplanet.com\/products\/sap-grc-grc-vendor\/\">SAP<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/threats\/microsoft-fights-off-another-record-ddos-attack\/\">Microsoft<\/a>, Oracle, Adobe, <a href=\"https:\/\/www.esecurityplanet.com\/cloud\/google-to-acquire-mandiant\/\">Google<\/a>, and <a href=\"https:\/\/www.esecurityplanet.com\/threats\/salesforce-email-service-used-for-phishing-campaign\/\">Salesforce<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Identity Managers<\/strong><\/h3>\n\n\n\n<p>Identity managers offer organizations a system wherein a set of credentials can merge to become a federated identity for a specific user to access applications across platforms. Like directory services, organization administrators can control access to particular data with network user identity management.<\/p>\n\n\n\n<p>Examples of popular enterprise identity provider systems include Microsoft and Azure <a href=\"https:\/\/www.esecurityplanet.com\/products\/active-directory-security-tools\/\">Active Directory<\/a> (AD), Lightweight Directory Protocol (LDAP), and Google Suite, while other vendors include Oracle, <a href=\"https:\/\/www.esecurityplanet.com\/products\/okta-identity-cloud\/\">Okta<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/products\/onelogin-unified-access-management-platform\/\">OneLogin<\/a>, and Auth0.<\/p>\n\n\n\n<p><strong>Also read<\/strong>: <a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\">Best Zero Trust Security Solutions<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"how\"><strong>How Does SAML Work?<\/strong><\/h2>\n\n\n\n<ol class=\"wp-block-list\"><li>A user logs into the identity provider\u2019s SSO.<\/li><li>The user submits a request for a privileged web page.<\/li><li>The service provider confirms user credentials with the identity provider.<\/li><li>The identity provider responds by validating the user.<\/li><li>The user accesses the web page requested.<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"why\"><strong>Why is SAML Important?<\/strong><\/h2>\n\n\n\n<p>Whereas web service providers have long played the role of identity managers, the emergence of identity providers offers users convenient access for storing credentials and, therefore, access to a list of accounts. SAML is the federated authentication and authorization process in this split of responsibilities, simplifying communication between parties.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/03\/ESP.MicrosoftSAMLGraphic-1024x561.png\" alt=\"A graphic showing how SAML 2.0 federation works for a Microsoft user.\" class=\"wp-image-21440\" width=\"638\" height=\"350\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.MicrosoftSAMLGraphic-1024x561.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.MicrosoftSAMLGraphic-300x164.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.MicrosoftSAMLGraphic-768x421.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.MicrosoftSAMLGraphic-150x82.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.MicrosoftSAMLGraphic-696x381.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.MicrosoftSAMLGraphic-1068x585.png 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.MicrosoftSAMLGraphic.png 1469w\" sizes=\"(max-width: 638px) 100vw, 638px\" \/><figcaption>A graphic showing how SAML 2.0 federation works for a Microsoft user.<\/figcaption><\/figure>\n\n\n\n<p><strong>Read more<\/strong>: <a href=\"https:\/\/www.esecurityplanet.com\/cloud\/machine-identity-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">How Machine Identities Can Imperil Enterprise Security<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"oauth\"><strong>OAuth vs SAML<\/strong><\/h2>\n\n\n\n<p>OAuth is also an example of a language web service providers use to communicate on behalf of users and applications, but they address different sides of the authorization-authentication coin.<\/p>\n\n\n\n<p>SAML is a standard managing identity management and federation, including systems like SSO. OAuth is a pure authorization protocol that pairs with OpenID Connect (OIDC), which handles authentication.<\/p>\n\n\n\n<p>SAML might be the more trusted and mature protocol of the two; however, OIDC is a newer authentication protocol designed for mobile and web applications. Another notable difference between the two languages is OAuth\u2019s use of the JSON Web Token (JWT). While SAML uses XML, JWTs are more lightweight, self-contained, and include a digital signature for independent verification without the authorization server.<\/p>\n\n\n\n<p>While SAML 2.0 remains widely in use, the growth of OAuth 2.0 paired with OIDC means it isn\u2019t deployed nearly as much.<\/p>\n\n\n\n<p><strong>Learn more<\/strong> about OAuth 2.0 with <a href=\"https:\/\/www.esecurityplanet.com\/mobile\/oauth\/\" target=\"_blank\" rel=\"noreferrer noopener\">OAuth: Our Guide to Industry Authorization<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"history\"><strong>IAM History: SAML in Context<\/strong><\/h2>\n\n\n\n<p>In 2001, the Organization for the Advanced for Structured Information Standards (OASIS) began work on what would become an industry-first XML framework for exchanging authentication and authorization data. A year later, SAML 1.0 would become an official OASIS standard. In 2005, OASIS released 2.0, which gained widespread appeal for web developers and service providers by the end of the decade.<\/p>\n\n\n\n<p>While SAML 2.0 led the way, the first two iterations of OIDC, OpenID, were released in 2006 and 2007 as alternative authentication protocols. The launch of OAuth 1.0 in 2010 and OAuth 2.0 two years later meant <a href=\"https:\/\/www.esecurityplanet.com\/products\/third-party-risk-management\/\">third parties<\/a> had a deliberate protocol for authorizing secure, user-agent, delegated access. Rather than dealing with a separate protocol for authentication needs, the release of OpenID Connect in 2014 gave developers an added layer fulfilling initial access across accounts.<\/p>\n\n\n\n<p>Despite the recent prevalence of OAuth and OIDC for authentication and authorization, SAML 2.0 remains a widely offered and used protocol for enterprise organizations.<\/p>\n\n\n\n<p><strong>Also read<\/strong>: <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-ngfw\/\" target=\"_blank\" rel=\"noreferrer noopener\">Best Next-Generation Firewall (NGFW) Vendors<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6ef73c5f48-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6ef73c5f48\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6ef73c5f48\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6ef73c5f48\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6ef73c5f48\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6ef73c5f48\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6ef73c5f48\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>SAML is an open standard facilitating the communication and verification of credentials between identity providers and service providers for users everywhere. In 2005, the open standard consortium OASIS released SAML 2.0 to broad appeal. As smart mobile devices boomed, so did the number of web applications and the need to address never-ending logins. SAML was [&hellip;]<\/p>\n","protected":false},"author":250,"featured_media":21438,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[22,18,14],"tags":[5276,9651,7787],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[322,136,162,308,377,384,140,282,31781,381,141,334,143,375,31775],"class_list":["post-21437","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-applications","category-mobile","category-networks","tag-authentication","tag-faq","tag-web-applications","b2b_audience-awareness-and-consideration","b2b_product-application-management","b2b_product-applications","b2b_product-email-applications","b2b_product-enterprise-network-management","b2b_product-gateway-and-network-security","b2b_product-identity-management-privacy","b2b_product-mobile","b2b_product-mobile-application-software","b2b_product-multi-factor-access-management","b2b_product-network-access-control-nac","b2b_product-networking","b2b_product-remote-access","b2b_product-security","b2b_product-security-management","b2b_product-web-applications-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SAML: Still Going Strong After Two Decades | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"SAML is an authentication protocol for verifying access between identity and service providers for users requesting applications. Learn more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/applications\/saml\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SAML: Still Going Strong After Two Decades | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"SAML is an authentication protocol for verifying access between identity and service providers for users requesting applications. Learn more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/applications\/saml\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-26T00:04:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-22T17:00:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.SAML_-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1706\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sam Ingalls\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/SamIngalls\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sam Ingalls\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/saml\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/saml\/\"},\"author\":{\"name\":\"Sam Ingalls\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2\"},\"headline\":\"SAML: Still Going Strong After Two Decades\",\"datePublished\":\"2022-03-26T00:04:29+00:00\",\"dateModified\":\"2022-07-22T17:00:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/saml\/\"},\"wordCount\":863,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/saml\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.SAML_-scaled.jpg\",\"keywords\":[\"authentication\",\"FAQ\",\"web applications\"],\"articleSection\":[\"Applications\",\"Mobile\",\"Networks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/saml\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/applications\/saml\/\",\"name\":\"SAML: Still Going Strong After Two Decades | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/saml\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/saml\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.SAML_-scaled.jpg\",\"datePublished\":\"2022-03-26T00:04:29+00:00\",\"dateModified\":\"2022-07-22T17:00:21+00:00\",\"description\":\"SAML is an authentication protocol for verifying access between identity and service providers for users requesting applications. Learn more.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/saml\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/applications\/saml\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/saml\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.SAML_-scaled.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.SAML_-scaled.jpg\",\"width\":2560,\"height\":1706,\"caption\":\"A computer screen showing an \\\"authentication failed\\\" screen as this article is about SAML, the authentication protocol that made single sign-on (SSO) huge for individuals and enterprises alike.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/applications\/saml\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SAML: Still Going Strong After Two Decades\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2\",\"name\":\"Sam Ingalls\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg\",\"caption\":\"Sam Ingalls\"},\"description\":\"Sam Ingalls is an award-winning writer and researcher covering enterprise technology, cybersecurity, data centers, and IT trends, for eSecurity Planet, Tech Republic, ServerWatch, Webopedia, and Channel Insider.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/singalls\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/SamIngalls\"],\"url\":\"https:\/\/www.esecurityplanet.com\/author\/singalls\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SAML: Still Going Strong After Two Decades | eSecurity Planet","description":"SAML is an authentication protocol for verifying access between identity and service providers for users requesting applications. Learn more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/applications\/saml\/","og_locale":"en_US","og_type":"article","og_title":"SAML: Still Going Strong After Two Decades | eSecurity Planet","og_description":"SAML is an authentication protocol for verifying access between identity and service providers for users requesting applications. Learn more.","og_url":"https:\/\/www.esecurityplanet.com\/applications\/saml\/","og_site_name":"eSecurity Planet","article_published_time":"2022-03-26T00:04:29+00:00","article_modified_time":"2022-07-22T17:00:21+00:00","og_image":[{"width":2560,"height":1706,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.SAML_-scaled.jpg","type":"image\/jpeg"}],"author":"Sam Ingalls","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/SamIngalls","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Sam Ingalls","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/applications\/saml\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/saml\/"},"author":{"name":"Sam Ingalls","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2"},"headline":"SAML: Still Going Strong After Two Decades","datePublished":"2022-03-26T00:04:29+00:00","dateModified":"2022-07-22T17:00:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/saml\/"},"wordCount":863,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/saml\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.SAML_-scaled.jpg","keywords":["authentication","FAQ","web applications"],"articleSection":["Applications","Mobile","Networks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/applications\/saml\/","url":"https:\/\/www.esecurityplanet.com\/applications\/saml\/","name":"SAML: Still Going Strong After Two Decades | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/saml\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/saml\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.SAML_-scaled.jpg","datePublished":"2022-03-26T00:04:29+00:00","dateModified":"2022-07-22T17:00:21+00:00","description":"SAML is an authentication protocol for verifying access between identity and service providers for users requesting applications. Learn more.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/applications\/saml\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/applications\/saml\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/applications\/saml\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.SAML_-scaled.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/03\/ESP.SAML_-scaled.jpg","width":2560,"height":1706,"caption":"A computer screen showing an \"authentication failed\" screen as this article is about SAML, the authentication protocol that made single sign-on (SSO) huge for individuals and enterprises alike."},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/applications\/saml\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"SAML: Still Going Strong After Two Decades"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/40407ef36d4a8822d7fcd993b93faba2","name":"Sam Ingalls","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/Sam-Ingalls-Square-150x150.jpg","caption":"Sam Ingalls"},"description":"Sam Ingalls is an award-winning writer and researcher covering enterprise technology, cybersecurity, data centers, and IT trends, for eSecurity Planet, Tech Republic, ServerWatch, Webopedia, and Channel Insider.","sameAs":["https:\/\/www.linkedin.com\/in\/singalls\/","https:\/\/x.com\/https:\/\/twitter.com\/SamIngalls"],"url":"https:\/\/www.esecurityplanet.com\/author\/singalls\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/21437"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/250"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=21437"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/21437\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/21438"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=21437"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=21437"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=21437"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=21437"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=21437"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=21437"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}