A Developer's Guide to SAML

Поделиться
HTML-код
  • Опубликовано: 8 апр 2021
  • SAML is one of the most widely used identity security standards in the industry today, yet can seem daunting to support. This is especially true for developers being asked to support SAML for the first time. The age of SAML combined with its numerous revisions over the years makes it difficult to learn and use. Not to mention the complexities of SAML being used in slightly different and nuanced ways in different applications. In this talk, you'll learn all about the SAML protocol, how it works, and how to use it in a modern application. You'll also learn what pitfalls to look out for and how to resolve them.
    Speakers:
    Nick Gamb, Okta
    __
    Don't forget to subscribe to our channel and hit the notification bell so you never miss an upload: bit.ly/OktaRUclips​
    __
    Additional SAML resources:
    auth0.com/blog/how-saml-authe...
    samltool.io/
    __
    Sign up for our monthly newsletter! a0.to/zeroindex
    Want more Okta? Check out our social media for updates:
    bit.ly/OktaLinkedIn​
    bit.ly/OktaTwitter​
    bit.ly/OktaFacebook
  • НаукаНаука

Комментарии • 115

  • @joneslt
    @joneslt Год назад +22

    This was fantastic! There are too many people out there attempting to post technical instructional videos who don't really have an in depth understanding of the material, or don't know how to explain it. This was a rare find. Thanks for posting!

  • @willhu4272
    @willhu4272 3 года назад +54

    It's the best video that explains the whole story of SAML. The extraordinary part is explaining "Most common weak points" start from 17:32!

  • @pravin24it
    @pravin24it Год назад +5

    Best thing I found on RUclips for SAML security audit. Thank you very much for detailed information about SAML including the flows.

  • @kepler_iii9373
    @kepler_iii9373 2 месяца назад

    Okta's technical guides around identity never disappoint!

  • @andresau90
    @andresau90 2 года назад +3

    THE BEST video for developers to keep things secure!

  • @jongpac2
    @jongpac2 Месяц назад

    This is the best lecture I have seen including school to online tutorials, I love you!!!

  • @gregorycook5305
    @gregorycook5305 Год назад +3

    I know this video is old but it's still chock full of information. Thank you for the video sir.

  • @vil9386
    @vil9386 2 года назад +1

    understood SAML from developers' view at last.... very easily... thank you 🦃

  • @Spegix1
    @Spegix1 2 года назад +6

    Amazing, thank you for all the work you do!

  • @kolcha
    @kolcha Год назад +4

    Very well organized guide and superbly presented. You are excellent teacher. Thank you.

  • @tech_gadgets_maniac
    @tech_gadgets_maniac 2 года назад +1

    Best ever video on SSO... Simply love it

  • @JohnSmith-wz7he
    @JohnSmith-wz7he 2 года назад +2

    Awesome effort . Very good. Thank you for spending the time to make this presentation

  • @abhishekrai4325
    @abhishekrai4325 2 года назад +1

    Thank you so much for this. Amazing explanation !

  • @ahmetcetin3432
    @ahmetcetin3432 2 года назад +1

    Great, beneficial introduction to SAML, thanks!

  • @alexejgerstmaier4989
    @alexejgerstmaier4989 Год назад +1

    Best video on SAML ever!
    Kind had to grin at 7:02 where he talks about the convenience feature of saml metadata! Real shame that okta lacks the upload SP metadata feature ;-) this is quite standard for other IDPs

  • @paolofabrizio
    @paolofabrizio 2 месяца назад

    Wow, such a great video. I just wanted to know about SAML and IdP workflow but this was so well explained and entertaining that I had to watch it until the end.

  • @revathiramanadham3843
    @revathiramanadham3843 3 года назад +2

    Best explanation... Thank you.

  • @321zipzapzoom
    @321zipzapzoom 2 года назад +2

    Concepts clearly told and upto Point, Could You do couple of more Videos on QnA involving guys to spend some time along revolving around common Usecases specific to Vendors.

  • @jjrock11
    @jjrock11 3 года назад +2

    Nice work, Nick!

  • @jdsprankle
    @jdsprankle 2 года назад +2

    Amazing video, very clearly explained

  • @rafaelbraga3d
    @rafaelbraga3d Год назад +2

    Awesome explanation, thanks a lot! Now I understand better this flow!

  • @728100
    @728100 Год назад +1

    Great explanations regarding SAML like it.

  • @murshidav5123
    @murshidav5123 3 года назад +3

    Nice once. The concept is clear now.
    Can you do a video on SAML + NodeJs

  • @YuliyaTsukanava
    @YuliyaTsukanava 4 месяца назад

    Really great explanation! Thank you so much!

  • @jonathanparker1927
    @jonathanparker1927 Год назад +2

    very nice, thanks for taking the time!

  • @NTICTECH
    @NTICTECH 2 года назад

    hello thanks for the explanation it was very helpful i want to know how to configure a saml with a loadbalancer i had problem that the load balancer doesn't sign on the SPs

  • @sajhak
    @sajhak Год назад +2

    OktaDev videos are the best ever in explaining the concepts! ❤
    Would have been much better if you have explained SAML bindings

    • @OktaDev
      @OktaDev  Год назад

      Noted! Thanks for your feedback and we are glad that you enjoy our videos.

    • @AdityaKumar-hy6fo
      @AdityaKumar-hy6fo Год назад

      Try this one
      ruclips.net/video/SvppXbpv-5k/видео.html

  • @DavidGarcia-nz3sw
    @DavidGarcia-nz3sw Год назад +2

    Correct me if I'm wrong, but as I understand it SSO only happens when a user performs an Identity Provider Initiation. By providing your credentials to the Identity Provider once, the Identity Provider can send SAML responses toward any application or service you're trying to use.
    However, if as a user you're required to start the SAML process with the Service Provider first (Service Provider Initiation), then a SAML Request is sent to the Identity Provider who in turn returns a SAML Response. This interaction is only valid for that one, specific Service Provider, not all Service Providers, meaning that you'd have to repeat this login process again for any other application you might want to use.
    In other words, for any Service Provider that requires you to begin the authentication process with itself first, you're going to be redirected somewhere to provide your login credentials. If you have 3 Service Providers asking to begin the process with each of them, then you're not really participating in a Single-Sign-On experience -- Is this correct?

    • @maxwellkgalema5568
      @maxwellkgalema5568 Год назад

      That's a good question and I believe the answer is yes, you not participating.

    • @ShijenN
      @ShijenN Год назад

      Great question!!! Did you get the answer for this ?

    • @jano.5485
      @jano.5485 8 месяцев назад

      Yes and no. If the authentication towards the IdP is also done via SSO (for example Kerberos in a Windows Active Directory environment), then it does not matter how many SAML requests are passed to the IdP, it all happens transparently to the user. At least that is my understanding.

  • @Jacobra60
    @Jacobra60 2 года назад +1

    Good video. Could you show viewing and debugging SAML requests/responses in Chrome or FF. Also can you show some examples of claims rules.

  • @user-pt3kw3gg9z
    @user-pt3kw3gg9z 3 года назад +2

    Perfect explanation, thanks!

  • @smohanty3507
    @smohanty3507 3 года назад +4

    thats what I am looking for..perfect explanation

  • @danielromerolevy3075
    @danielromerolevy3075 2 года назад

    Awesome explanation!

  • @ajmags4731
    @ajmags4731 Год назад +1

    This has been very helpful!!!

  • @karankanojiya7672
    @karankanojiya7672 2 года назад +1

    Excellent Sir !

  • @user-by5cy9um8x
    @user-by5cy9um8x 6 месяцев назад

    @OktaDev,
    In 'Limit the XML Parser" , is the sub heading 'Disable Document Type Definition (DTD) Fetching' wrong and ought to be 'Document Type Definition (DTD) Fetching? ( Felt like that from context )

  • @shubhamsingh-gb5zh
    @shubhamsingh-gb5zh 11 месяцев назад +1

    Amazing explanation 🙇‍♂️

  • @rajendrakumarnagraj4690
    @rajendrakumarnagraj4690 Месяц назад

    Very well explained. Thanks

  • @dimitro.cardellini
    @dimitro.cardellini 7 месяцев назад +1

    Really useful video!
    Thanks a lot

  • @rashidmehraj8542
    @rashidmehraj8542 Год назад +1

    Excellent Video. TBH! i was confused earlier on how to read a SAML response.

    • @OktaDev
      @OktaDev  Год назад

      Glad we could help! Please also check out these additional resources:
      auth0.com/blog/how-saml-authentication-works/
      samltool.io/

  • @nagap4231
    @nagap4231 Год назад

    Simply Superb

  • @jagdeepsingh-rx7tw
    @jagdeepsingh-rx7tw 7 месяцев назад

    @oktadev is there a difference between calculation digest value for saml version 1.0 and 2.0?

  • @Testacabeza
    @Testacabeza 8 месяцев назад +1

    Excellent video.

  • @vadivelan4228
    @vadivelan4228 8 месяцев назад +1

    Good one. Thank you.

  • @AbhishekSen
    @AbhishekSen Год назад +1

    Fantastic video!

  • @yashgangrade5460
    @yashgangrade5460 2 месяца назад

    Totally worth it.

  • @fsams068
    @fsams068 2 года назад +1

    Very clear, thanks a lot for that!

  • @hexchad765
    @hexchad765 2 года назад +1

    How would this change when using a CLP (Central Login Page) external to all of this

  • @oleksandrlytvyn532
    @oleksandrlytvyn532 Год назад +1

    Thanks

  • @esra_erimez
    @esra_erimez 2 года назад

    Fantastic!

  • @jondo-vh8tx
    @jondo-vh8tx 3 месяца назад

    very well explained

  • @gandarmarc2059
    @gandarmarc2059 Год назад

    Very clear

  • @coachreyy
    @coachreyy Год назад

    This is the best video explaining SAML

  • @iwayworld3044
    @iwayworld3044 11 месяцев назад

    Http artifect binding in SAML , can u explain real use case and which kind of attack gets eliminated and how to use it

  • @jayak3768
    @jayak3768 Год назад +1

    Sir can u clarify that all the SP - IP communication is via client browser and not directly between the two parties. Or is there a back channel between the two parties in addition to the client as the intermediary.

    • @OktaDev
      @OktaDev  Год назад

      Thanks for watching the video. All the communication between SP and IdP shown in this video happens through the front channel (browser/user agent).

  • @sunnyd9878
    @sunnyd9878 4 месяца назад +1

    Just great awesome explanation

  • @ReviveNRepair
    @ReviveNRepair Год назад

    20:58 This could also be mitigated by making sure all the assertions in the SAML response are signed, right?

  • @drenyl6491
    @drenyl6491 Год назад

    How to generate SAML request xml? Should the developer of the application generate and supply value on the xml tags?

  • @durangodave
    @durangodave 11 месяцев назад +1

    Great video thank you, well done. However i do have to disagree with you on one thing, using a SSO may be more convenient but it is less secure. The best security IMO is to keep PW under personal care and just find a way to remember them. This is less convenient but the fewer parts involved in security validation the better. It is similar to telling noone your password vrs telling 5 friends with the promise they wont tell anyone. Security is only as good as the weakest link and the more links involved the less secure IMO. I code for SSO but i do not use SSO personally. Each of us must make the choice based on convenience.

  • @g2D1
    @g2D1 11 месяцев назад +1

    Terrific!

  • @hassaneloufir8440
    @hassaneloufir8440 2 года назад

    thank you so much, grand respect.

  • @germanmartin8778
    @germanmartin8778 Год назад +1

    Thanks you so much, for explain SAML

  • @PriyankRupareliya
    @PriyankRupareliya Год назад

    Thank you, this is gold

  • @user-ps1zb7fx1u
    @user-ps1zb7fx1u Год назад +1

    Excellent explanation, thanks. I finnaly understand SAML and difference beetwen this protocol and OAuth/OpenId Connect. I alse recommend watch video about OAuth/OpenId Connect by Nate Barbettini in this chanell

    • @OktaDev
      @OktaDev  Год назад

      You are welcome! That video from Nate is great!

  • @neadlead2621
    @neadlead2621 6 месяцев назад +1

    very very very good one

  • @gabrielvinante
    @gabrielvinante 2 года назад

    now i understand! great explanation. do you have a video using simpleSamlPhp? thanks in advance

  • @travel_and_dine4871
    @travel_and_dine4871 Год назад

    Hi sir, but how system is passing the username / email id in request to validate at IDP

  • @lizermo2191
    @lizermo2191 Год назад

    I love u man.
    Thanks to you, I'll probably get a better job. I'll keep you updated

  • @davidaustin967
    @davidaustin967 2 года назад

    great guide - thanks for video

  • @sudipghosh7253
    @sudipghosh7253 2 года назад

    Clean and perfect 🔥

  • @sreyas_sj
    @sreyas_sj 15 дней назад

    In a project that I'm working in, I want to redirect the user to Azure for validating the user, for that how do I redirect him to Azure and generate SAML SSO authentication req?
    How do I generate this XML req in code, didn't find any resources regarding this
    Any help would be great. Thanks

  • @saisrivastavatumuluri9291
    @saisrivastavatumuluri9291 2 года назад

    i like the security part of the vedio

  • @ashannaveen9946
    @ashannaveen9946 3 года назад +1

    Good explanation.

  • @gdocs1307
    @gdocs1307 2 года назад

    Identity Provider means that all users has to be registered there with actual credentials?

    • @vishalgarg7102
      @vishalgarg7102 2 года назад +3

      No , Actual credentials are saved in Database . Generally IDP communicate with DB for authentication

  • @ghanshyamkhatri3541
    @ghanshyamkhatri3541 2 года назад +1

    simply Wow!!!

  • @vipinkoul595
    @vipinkoul595 4 месяца назад

    why do we need to have user profile at Service provider? I am under the assumption that all user details are only in IDP, and not in SP. why do we need to have user details in SP? In that case, can't we skip SSO and login directly into SP if SP is also having user details. Doesn't having user details in IDP and SP keep information at two places? Can anyone help explain it, please.

    • @TedS-yt2yg
      @TedS-yt2yg 3 месяца назад

      If you are allowing users to login directly or use IDP, the profile will need to be stored on the SP side. Even if IDP is the only login solution, a minimum of information needs to be stored on the SP side to determine who logged in using the IDP - probably an email address. The email address provided by the IDP needs to match an email address on the SP side.
      There are alternatives to this as can be seen in the provisioning section.

  • @rezakhan9973
    @rezakhan9973 2 года назад

    Perfect - thanks

  • @olmanmora21
    @olmanmora21 2 года назад +1

    27 minutes on youtube sometimes is way better than 4 hours in a lesson room.

  • @wegwerfDave
    @wegwerfDave 3 года назад +1

    Really good

  • @muhammadusamaalvi6910
    @muhammadusamaalvi6910 Год назад

    very well explained.

  • @khaledyalraymi2468
    @khaledyalraymi2468 2 года назад

    Thank you.

  • @mohamedhashish216
    @mohamedhashish216 Год назад

    Thank you so much

  • @swedixx65
    @swedixx65 2 года назад

    Great video! :)

  • @focalpointcdw9731
    @focalpointcdw9731 2 года назад

    Great video

  • @SJPYT
    @SJPYT Год назад

    Thanks mate!

  • @samyakjain5974
    @samyakjain5974 2 года назад +1

    Can you explain a bit on how to Validate a signature

  • @nouribenz
    @nouribenz 2 года назад +1

    Thanks for ur time

  • @JessicaMartinez-kd7vx
    @JessicaMartinez-kd7vx Год назад

    Good stuff

  • @PaulFidika
    @PaulFidika 2 года назад +5

    Why is he only talking into my right ear?

  • @MrWaf007
    @MrWaf007 10 месяцев назад

    attrubtes?

  • @SaikiranMurthy
    @SaikiranMurthy Год назад

    this was good , however i need some more info on Canvas vs SAML

  • @dsldsl6460
    @dsldsl6460 2 месяца назад

    This is a good answer to why is still easy to hack a big company :)) . The pour dev has to be extra carefull when configuring the xml parser :)))

  • @LadyLatency
    @LadyLatency 2 года назад +1

    ATTRUBTES!!

  • @stackunderflow5951
    @stackunderflow5951 2 года назад +2

    Well, it's better to walk through a SAML workflow and then explain the SAML terms and concepts. It will be more clear.

  • @purplepanther4153
    @purplepanther4153 Год назад

    Confusing.

  • @deanliu7125
    @deanliu7125 Год назад

    It is funny that you speak of OIDC as a replacement for SAML.
    Meanwhile Okta still does not support OIDC for SCIM provisioned application, forcing me to learn about this SAML in the first place...

    • @clickdilip
      @clickdilip Год назад

      It still doesn't and I'm forced to use SAML too

    • @clickdilip
      @clickdilip Год назад

      can we use event hooks in Okta for this purpose?

  • @prozacsf84
    @prozacsf84 7 месяцев назад

    Oauth forever, fk saml

  • @cheesechoker
    @cheesechoker Год назад

    Attrubtes

  • @whirled_peas
    @whirled_peas 2 года назад

    Really useful intro but bro, I think your sweater was on inside out

  • @fatal510
    @fatal510 2 года назад +6

    What a joke of a system. No one should be using SAML and we just need to migrate away from this shit.

  • @fatal510
    @fatal510 2 года назад +2

    SAML looks like it was made me some old white guys.