Security Assertion Markup Language (SAML) is one of the most widely used open standards for authentication and authorization between multiple parties. SAML gives users a single sign-on (SSO) experience for applications.
At its core, Security Assertion Markup Language (SAML) 2.0 is a means to exchange authorization and authentication information between services. SAML is frequently used to implement internal corporate single sign-on (SSO) solutions, where the user logs into the IDP (Identity Provider) - a service that acts as the single source of identity, which then grants access to a subset of other internal services.
In addition to IDP, SP, and principals which are explained here, the following are more commonly used SAML terms:
SAML provides several methods for certification and trust among the SP and IDP interactions, among them:
Certification - SP and IDP provide each other with their public key, which is used in their interactions. Their values are reflected and represented in Fabric SAML configuration as SP_CERT_ALIAS and IDP_CERT_ALIAS.
As part of a pre-established trust relationship process between Fabric and the IDP, Fabric provides to the IDP IT team the signed certificate public key "crt" file to be uploaded at the IDP, and the IDP team sends to the Fabric team the IDP "crt"/"cert" to be located at Fabric.
Encryption - SAML supports several encryption methods, with SHA-256 being the most commonly used (this is also adopted by Fabric).
Trust - SP Entity ID and IDP Entity IDs are transferred upon request and response for trust purposes. Additionally, any request is sent with an ID, which the SP can then verify upon response.
Security Assertion Markup Language (SAML) is one of the most widely used open standards for authentication and authorization between multiple parties. SAML gives users a single sign-on (SSO) experience for applications.
At its core, Security Assertion Markup Language (SAML) 2.0 is a means to exchange authorization and authentication information between services. SAML is frequently used to implement internal corporate single sign-on (SSO) solutions, where the user logs into the IDP (Identity Provider) - a service that acts as the single source of identity, which then grants access to a subset of other internal services.
In addition to IDP, SP, and principals which are explained here, the following are more commonly used SAML terms:
SAML provides several methods for certification and trust among the SP and IDP interactions, among them:
Certification - SP and IDP provide each other with their public key, which is used in their interactions. Their values are reflected and represented in Fabric SAML configuration as SP_CERT_ALIAS and IDP_CERT_ALIAS.
As part of a pre-established trust relationship process between Fabric and the IDP, Fabric provides to the IDP IT team the signed certificate public key "crt" file to be uploaded at the IDP, and the IDP team sends to the Fabric team the IDP "crt"/"cert" to be located at Fabric.
Encryption - SAML supports several encryption methods, with SHA-256 being the most commonly used (this is also adopted by Fabric).
Trust - SP Entity ID and IDP Entity IDs are transferred upon request and response for trust purposes. Additionally, any request is sent with an ID, which the SP can then verify upon response.