SAML AS AN SSO STANDARD FOR CUSTOMER IDENTITY MANAGEMENT. How to Create a Frictionless, Secure Customer Identity Management Strategy



Similar documents
The increasing popularity of mobile devices is rapidly changing how and where we

SAML Authentication Quick Start Guide

Using SAML for Single Sign-On in the SOA Software Platform

Introduction to SAML

OpenLogin: PTA, SAML, and OAuth/OpenID

How to Extend Identity Security to Your APIs

Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow

Single Sign On. SSO & ID Management for Web and Mobile Applications

Getting Started with Single Sign-On

SAML Authentication with BlackShield Cloud

A Standards-based Mobile Application IdM Architecture

Web Based Single Sign-On and Access Control

How To Use Salesforce Identity Features

How To Use Saml 2.0 Single Sign On With Qualysguard

Zendesk SSO with Cloud Secure using MobileIron MDM Server and Okta

IBM WebSphere Application Server

Flexible Identity Federation

Increase the Security of Your Box Account With Single Sign-On

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

Why Identity is at the Heart of the IoT

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM facebook/allidm

Building Secure Applications. James Tedrick

An Identity Management Survey. on Cloud Computing

For details about using automatic user provisioning with Salesforce, see Configuring user provisioning for Salesforce.

The Top 5 Federated Single Sign-On Scenarios

Improving Security and Productivity through Federation and Single Sign-on

OpenID Connect 1.0 for Enterprise

IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS

Configuring Salesforce

DIGIPASS as a Service. Google Apps Integration

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1

SAML-Based SSO Solution

New Single Sign-on Options for IBM Lotus Notes & Domino IBM Corporation

Get Success in Passing Your Certification Exam at first attempt!

Getting Started with Single Sign-On

OIOSAML Rich Client to Browser Scenario Version 1.0

Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia Pedro Borges

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, Integration Guide IBM

Simple Cloud Identity Management (SCIM)

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Salesforce

Egnyte Single Sign-On (SSO) Installation for OneLogin

Integrating Single Sign-on Across the Cloud By David Strom

Google Apps Deployment Guide

Dell One Identity Cloud Access Manager How to Develop OpenID Connect Apps

USING FEDERATED AUTHENTICATION WITH M-FILES

Tenrox. Single Sign-On (SSO) Setup Guide. January, Tenrox. All rights reserved.

IBM Tivoli Federated Identity Manager V6.2.2 Implementation. Version: Demo. Page <<1/10>>

SAML-Based SSO Solution

Lecture Notes for Advanced Web Security 2015

Single Sign On (SSO) Implementation Manual. For Connect 5 & MyConnect Sites

Perceptive Experience Single Sign-On Solutions

Federated Identity Management Solutions

Cloud Single Sign-On and On-Premise Identity Federation with SAP NetWeaver Cloud White Paper

STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN

Copyright Pivotal Software Inc, of 10

OAuth Guide Release 6.0

How to select the right Marketing Cloud Edition

Absorb Single Sign-On (SSO) V3.0

Copyright: WhosOnLocation Limited

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server

Interoperate in Cloud with Federation

How to Implement Enterprise SAML SSO

Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief

SAML Federated Identity at OASIS

IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0

SAML Security Option White Paper

nexus Hybrid Access Gateway

PARTNER INTEGRATION GUIDE. Edition 1.0

The Future of Cloud Identity Security. Michael Schwartz Founder / CEO Gluu

Installation and Administration Guide

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines

GENERAL OVERVIEW OF VARIOUS SSO SYSTEMS: ACTIVE DIRECTORY, GOOGLE & FACEBOOK

PingFederate. Windows Live Cloud Identity Connector. User Guide. Version 1.0

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

HP Software as a Service. Federated SSO Guide

An Oracle White Paper Dec Oracle Access Management Security Token Service

IBM WebSphere Application Server

Authentication Integration

An SAML Based SSO Architecture for Secure Data Exchange between User and OSS

SAML Single-Sign-On (SSO)

Identity Implementation Guide

The Primer: Nuts and Bolts of Federated Identity Management

Architecture Guidelines Application Security

Mobile Identity and Edge Security Forum Sentry Security Gateway. Jason Macy CTO, Forum Systems

Keeping access control while moving to the cloud. Presented by Zdenek Nejedly Computing & Communications Services University of Guelph

WebNow Single Sign-On Solutions

PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY

Identity. Provide. ...to Office 365 & Beyond

All can damage or destroy your company s computers along with the data and applications you rely on to run your business.

HP Software as a Service

WHITEPAPER. NAPPS: A Game-Changer for Mobile Single Sign-On (SSO)

COMCAST.COM - PRIVACY STATEMENT

Enhancing Web Application Security

Single Sign-On Implementation Guide

Simplify and Secure Cloud Access to Critical Business Data

Case Study: SSO for All: SSOCircle Makes Single Sign-On Available to Everyone

Glinda Cummings World Wide Tivoli Security Product Manager

Transcription:

SAML AS AN SSO STANDARD FOR CUSTOMER IDENTITY MANAGEMENT How to Create a Frictionless, Secure Customer Identity Management Strategy

PART 1: WHAT IS SAML?

SAML in Context Security Assertion Markup Language (SAML) is an Extensible Markup Language (XML) standard that enables secure websites and services to exchange user authentication data. SAML-based single sign-on (SSO) standards are designed to create frictionless identity verification and management processes between separate yet affiliated systems. Dating back to 2001, SAML has evolved to support a range of identity federation and management needs. Some of today s most popular third-party web applications such as Google Apps, Zendesk, and Salesforce use SAML to authenticate users. The end goals? Simplify data management. Streamline user flows. Keep customers engaged with your company. 54 percent of companies have difficulty managing and integrating data from today s many varied sources, while 50 percent are concerned about consistent data quality (Destination CRM). GIGYA.COM 3

Exploring Use Cases SAML has developed a reputation as a solution for employee management for IT teams within nonprofit, government, small business, and enterprise organizations. Internally, organizations use SAML as an SSO service to manage employee, partner and contractor access to network-based applications. But the applications of SAML extend much further. Within the past 5-10 years, the rise of ecommerce, social networks, mobile and connected devices has created the need for businesses to develop an external identity access management (IAM) strategy to keep up with the flood of identity data being created as customers connect across channels. GIGYA.COM 4

How SAML Stands Out Where SAML stands out from other authentication mechanisms is that it allows businesses to identify who users are and communicate information about them. Businesses can add structure to disparate user data to tell a rich, compelling story about each user profile. Below is a hypothetical example for how a membership-only television site can use SAML to better understand and track their customers. SAML: Authorization & Authentication Other Authentication Standards for Enterprise SSO Name: Emily Smith Job Title: Manager at tech company Gender: Female Level of Membership: Platinum Date Joined: 2009 Interest 1: Travel Interest 2: Documentaries Interest 3: Stand Up Comedy Name: Emily Smith Email Address: emilysmith@testemail.com User has permission to access features: Yes GIGYA.COM 5

SAML in Action Enterprise organizations rely on multiple service providers -- such as customer support and payment processing software -- to support core user experience goals. Companies will also often team up, through strategic partnership initiatives, to introduce new products and services to shared customer bases. SAML creates a structured, secure, and scalable process to integrate data between these web applications and authentication processes. GIGYA.COM 6

Example: Video Subscription Product Comcast XFINITY customers can stream content online. Comcast uses SAML to authenticate users, and then to provide authorization information regarding whether the user's subscription includes access to Discovery's online video content. GIGYA.COM 7

PART 2: THE TECHNOLOGY

How SAML Works Think of SAML as a handshake with an upgrade. SAML uses something called an assertion document -- an XML file that connects pieces of information -- between a service provider and an identity provider. In contrast, other standards provide identity management using only strings of text, which allow for only a very basic handshake. SAML s assertion document is more elaborate and more structured than other standards, making it an ideal identity management solution for enterprise organizations. SAML (1) identifies the user and (2) communicates predefined characteristics about that user. OAuth, in contrast, communicates only an access token, or alpha-numeric string, which can be used to obtain information about the user, but does not provide that information directly. If you want to create an elaborate user profile, you need to go with SAML. Image Source: Salesforce GIGYA.COM 9

Components of SAML The three SAML components include assertions, protocol, and binding. An assertion is a package of information related to user identity and security. There are three types of SAML assertions: authentication, attribute, and authorization. Authentication assertion is used to validate user identity, attribute assertion contains information about the user, and authorization assertion identifies what the user can do. Type of Assertion Question Asked Example Authentication Who is the user? The user is a valid user. Attribute Authorization Assertion Examples from Membership Video Site: What do we know about this particular user? Is the user authorized to access this particular membership area or website feature? The user is male, 34 years old, lives in Nebraska and subscribes to premium channels such as HBO. Comcast subscriber who pays for Discovery Channel access can watch Discovery Channel TV shows on XFINITY SAML protocol refers to how data gets transmitted from the sender to receiver. Sample binding determines how SAML requests map to standard messaging and communications protocols. SAML works with multiple protocols including Hypertext Transfer Protocol (HTTP) Simple Mail Transfer Protocol (SMTP), and File Transfer Protocol (FTP). SAML also supports SOAP, BizTalk, and Electronic Business XML (ebxml). GIGYA.COM 10

SAML Cheat Sheet SAML has a lot of moving parts -- it s a complex topic that is challenging to grasp. We put together the following cheat sheet for you to quickly and consistently reference as needed. GIGYA.COM 11

GIGYA.COM 12

SAML Visualized: How It All Fits Together This diagram explains how an example service provider would verify users with an identity provider. - User attempts to reach a hosted service or application. - The service or application generates a SAML request, which is encoded and embedded into the URL for the partner s SSO service. A parameter, set up as an identifier, is passed back without any modification or inspection. Image Source: Google GIGYA.COM 13

SAML Visualized: How It All Fits Together (cont d) - The application sends a redirect to the user s browser, which includes the encoded SAML authentication request that should be submitted to the partner s SSO service. - The partner decodes the SAML request and authenticates the user. - The partner generates a SAML response that contains the authenticated user's username. In accordance with the SAML 2.0 specification, this response is digitally signed with the partner's public and private DSA/RSA keys. Image Source: Google GIGYA.COM 14

PART 3: THE BIG PICTURE -- IS SAML RIGHT FOR YOU?

Adding Structure to Data Companies are collecting volumes of first-party data for product, marketing, business development, and support initiatives. To be action-oriented in creating a high-impact user experience and making a monetization plan, this data needs to be organized into a framework that supports scalable processes -- to break down identity silos and create a consolidated customer profile. SAML can help bind social and other unstructured profile data with internal profile data attributes via a trusted connection. This structured approach to organizing, analyzing, and using data provides the input to build predictive analytic capabilities, web personalization models, and marketing automation systems. Over 2.5 exabytes of data are created every single day (HBR). More than 90% of social media data is unstructured (BusinessInsider). 90% of all the data in the world has been created in the last two years (IBM). GIGYA.COM 16

Addressing Security Risks Enterprise organizations are targets for security breaches that could put them and their consumers at risk. Your identity management strategy needs to create an extremely secure environment for your businesses and your customers. SAML requires both the IdP and relying party to register with one another. The two sides exchange encryption keys and the SAML request-response sequence can be signed and validated. This is the most secure verification process available, as the two systems (1) know about each other and are (2) talking to each other directly. A solution like OpenID, for example, allows a relying party to request authentication from an IdP without prior registration and is used for public authentication. It s less secure than SAML. For this reason, SAML is the ideal option for consumer-facing enterprise organizations and companies -- like banks, for instance -- that are looking to engage in secure transactions. GIGYA.COM 17

The Balancing Act of Planning SAML s strongest benefit is also its biggest challenge. SAML is much more elaborate than other solutions like OpenID and requires careful pre-planning -- it is much more time consuming to implement than other solutions. You have to configure the sender and the recipient and determine the data structure for your assertion document upfront. The challenge with SAML is that, in order to make your system work, you have to configure your endpoint configuration as well as the configuration of the sender and receiver. Your system needs to be compatible with the SSO standard, and you ll need an interface that accommodates your end users. GIGYA.COM 18

Where Gigya Fits In Gigya's Customer Identity Management Platform allows companies to collect, consolidate, and manage first party customer data in the cloud, developing an end-to-end customer identity data management strategy built for today s variety of channels, devices and data. With the ability to serve as a SAML service provider or identity provider, as well as function as the service provider for social login and any OpenID identity provider, Gigya can help your business choose and implement an SSO standard that meets your business goals. GIGYA.COM 19

To learn how Gigya can help provide you with the tools and technology needed to develop a successful SAML strategy, visit gigya.com, or call us at 888.660.1469. ABOUT GIGYA Gigya's Customer Identity Management Platform helps companies build better customer relationships by turning unknown visitors into known, loyal and engaged customers. With Gigya s technology, businesses increase registrations and identify customers across devices, consolidate data into rich customer profiles, and provide better service, products and experiences by integrating data into marketing and service applications. Gigya's platform was designed from the ground up for social identities, mobile devices, consumer privacy and modern marketing. Gigya provides developers with the APIs they need to easily build and maintain secure and scalable registration, authentication, profile management, data analytics and third-party integrations. More than 700 of the world s leading businesses such as Fox, Forbes, and Verizon rely on Gigya to build identity-driven relationships and to provide scalable, secure Customer Identity Management. For more details about Gigya, visit www.gigya.com. 2014 Gigya Incorporated. All rights reserved. Gigya, the Gigya logo, and Customer Identity Management Platform are either registered trademarks or trademarks of Gigya Incorporated in the United States and/or other countries. All other trademarks are the property of their respective owners. Gigya does not own any end user data or maintain any other rights to this data, other than utilizing it to make Gigya's services available to our clients and their end users. Gigya acts as an agent or back-end vendor of its client's website or mobile application, to which the end user of our client granted permissions (if applicable). Gigya facilitates the collection, transfer and storage of end user data solely on behalf of its clients and at its clients' direction. For more information, please see Gigya's Privacy Policy, available at http://www.gigya.com/privacy-policy/.