{"id":14731,"date":"2023-11-20T16:00:00","date_gmt":"2023-11-20T16:00:00","guid":{"rendered":"https:\/\/businessyield.com\/tech\/?p=14731"},"modified":"2023-11-19T19:12:50","modified_gmt":"2023-11-19T19:12:50","slug":"what-is-saml-definition-and-how-it-works","status":"publish","type":"post","link":"https:\/\/businessyield.com\/tech\/cyber-security\/what-is-saml-definition-and-how-it-works\/","title":{"rendered":"What Is SAML: Definition And How It Works","gt_translate_keys":[{"key":"rendered","format":"text"}]},"content":{"rendered":"\n<p>Security Assertion Markup Language (SAML) is an open standard for exchanging authentication and authorization data between parties, in particular, between an identity provider and a service provider. It is an XML-based markup language for security assertions (statements that service providers use to make access-control decisions). <\/p>\n\n\n\n<p>It is also:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A set of XML-based protocol messages<\/li>\n\n\n\n<li>A set of protocol message bindings<\/li>\n\n\n\n<li>A set of profiles (utilizing all of the above)<\/li>\n<\/ul>\n\n\n\n<p>An important use case that SAML addresses is web-browser single sign-on (SSO). Single sign-on is relatively easy to accomplish within a security domain (using cookies, for example) but extending SSO across security domains is more difficult and resulted in the proliferation of non-interoperable proprietary technologies. <\/p>\n\n\n\n<p>The SAML Web Browser SSO profile was specified and standardized to promote interoperability.<\/p>\n\n\n\n<p>The Organization for the Advancement of Structured Information Standards (OASIS) manages the SAML protocol. SAML 2.0, the current version, was published as an OASIS standard in 2005.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-understanding-saml\"><span id=\"understanding-saml\"><strong>Understanding SAML<\/strong><\/span><\/h2>\n\n\n\n<p>In computing and networking, one of the major challenges is getting systems and devices built by different vendors for different purposes to work together. This is called &#8220;interoperability&#8221;: the ability for different machines to interact with each other, despite their differing technical specifications. SAML is an interoperable standard \u2014 it is a widely accepted way to communicate a user&#8217;s identity to cloud service providers.<\/p>\n\n\n\n<p>Security Assertion Markup Language (SAML) is an open standard for sharing security information about identity, authentication and authorization across different systems. SAML is implemented with the Extensible Markup Language (XML) standard for sharing data. It provides a framework for implementing single sign-on (SSO) and other federated identity systems. <\/p>\n\n\n\n<p>A federated identity system links an individual identity to multiple identity domains. <\/p>\n\n\n\n<p>This approach enables SSO that encompasses resources on an enterprise network, trusted third-party vendors, and customer networks.<\/p>\n\n\n\n<p>SAML is an important component of SSO systems that enable users to access multiple applications, services or websites from a single login process. Identity and authentication levels are shared across different systems and services using the SAML protocol to request, receive and format that data.<\/p>\n\n\n\n<h2 id=\"what-is-single-sign-on-sso\" class=\"wp-block-heading\"><strong>What is single sign-on (SSO)?<\/strong><\/h2>\n\n\n\n<p>Single sign-on (SSO) is a way for users to be authenticated for multiple applications and services at once. With SSO, a user signs in at a single login screen and can then use some apps. Users do not need to confirm their identity with every single service they use.<\/p>\n\n\n\n<p>For this to take place, the SSO system must communicate with every external app to tell them that the user is signed in. This is where SAML comes into play.<\/p>\n\n\n\n<h2 id=\"difference-between-saml-and-sso\" class=\"wp-block-heading\"><strong>Difference between SAML and SSO<\/strong><\/h2>\n\n\n\n<p>SAML is a platform for requesting authentication. Its most common use is to enable SSO. Some products that implement SSO services using SAML include the following:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Microsoft Azure AD<\/li>\n\n\n\n<li>Citrix Workspace<\/li>\n\n\n\n<li>Entrust Identity<\/li>\n\n\n\n<li>VMware vSphere<\/li>\n<\/ul>\n\n\n\n<p>SSOs implement federated identity management to enable multiple domains to authenticate users using one set of credentials. SSO can use SAML protocols to exchange authentication information, or it can use some other protocol, like\u00a0OpenID, to manage cross-domain authentication.<\/p>\n\n\n\n<h2 id=\"how-does-saml-work\" class=\"wp-block-heading\"><strong>How does SAML work?<\/strong><\/h2>\n\n\n\n<p>A typical SSO authentication process involves these three parties:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Principal\/subject:<\/strong>\u00a0This is almost always a human user who is trying to access a cloud-hosted application.<\/li>\n\n\n\n<li><strong>Identity provider:<\/strong>\u00a0An\u00a0identity provider (IdP)\u00a0is a cloud software service that stores and confirms user identity, typically through a login process. Essentially, an IdP&#8217;s role is to say, &#8220;I know this person, and here is what they are allowed to do.&#8221; An SSO system may be separate from the IdP, but in those cases, the SSO essentially acts as a representative for the IdP, so they are the same in a workflow.<\/li>\n\n\n\n<li><strong>Service provider:<\/strong>\u00a0This is the cloud-hosted application or service the user wants to use. Common examples include cloud email platforms such as Gmail and Microsoft Office 365, cloud storage services such as Google Drive and AWS S3, and communications apps such as Slack and Skype. Ordinarily, a user would just log in to these services directly, but when SSO is used, the user logs into the SSO instead, and SAML is used to give them access instead of a direct login.<\/li>\n<\/ul>\n\n\n\n<p>This is what a typical flow might look like:<\/p>\n\n\n\n<p>The principal sends a request to the service provider, who then requests authentication from the identity provider. The identity provider sends a SAML assertion to the service provider, and the service provider can then send a response to the principal.<\/p>\n\n\n\n<p>If the principal (the user) was not already logged in, the identity provider may prompt them to log in before sending an assertion.<\/p>\n\n\n\n<h2 id=\"saml-components\" class=\"wp-block-heading\"><strong>SAML components<\/strong><\/h2>\n\n\n\n<p>It incorporates four different types of components:<\/p>\n\n\n\n<h3 id=\"saml-assertions\" class=\"wp-block-heading\"><strong>SAML assertions<\/strong><\/h3>\n\n\n\n<p>These are statements of identity, authentication and authorization information. They are formatted using XML tags specified in SAML.<\/p>\n\n\n\n<p>According to the core\u00a0protocol specification, an assertion is a unit of information that supplies zero or more statements made by a SAML authority. Authorities are any system that generates SAML authentication assertions. The identity providers are examples of these authorities.<\/p>\n\n\n\n<p>SAML specifies three types of assertions:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>An&nbsp;<strong>authentication assertion<\/strong>&nbsp;indicates that the subject of the assertion has been authenticated. It includes the time and method of authentication, as well as the subject being authenticated.<\/li>\n\n\n\n<li>An\u00a0<strong>attribute assertion<\/strong>\u00a0associates the subject of the assertion with the specified attributes. A specified attribute refers to a defined piece of information relating to the authentication subject.<\/li>\n\n\n\n<li>An&nbsp;<strong>authorization decision assertion<\/strong>&nbsp;indicates whether a subject&#8217;s request to access a resource has been approved or declined.<\/li>\n<\/ol>\n\n\n\n<h3 id=\"saml-protocols\" class=\"wp-block-heading\"><strong>SAML protocols<\/strong><\/h3>\n\n\n\n<p>These define how different entities request and respond to requests for security information. Like assertions, these protocols are encoded with XML tags specified in SAML.<\/p>\n\n\n\n<p>SAML defines its own generalized protocols for request\/response interactions between systems and the entities that can be authenticated &#8212; either principals or subjects. SAML 2.0 protocols include the following:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Authentication Request Protocol<\/strong>&nbsp;defines requests for authentication assertions and valid responses to such requests. This protocol is used when a request sent from a user to a service provider needs to be redirected to an identity provider.<\/li>\n\n\n\n<li><strong>Single Logout Protocol<\/strong>&nbsp;defines a technique in which all of a user&#8217;s active sessions can be terminated nearly simultaneously. This capability is important for SSO implementations that require terminating sessions with multiple resources when the user logs out.<\/li>\n\n\n\n<li><strong>Assertion Query and Request Protocol<\/strong>&nbsp;defines requests for new and existing authentication assertions.<\/li>\n\n\n\n<li><strong>Artifact Resolution Protocol<\/strong>\u00a0defines how to request and transmit protocol messages using an identifying value or\u00a0artifact. This approach simplifies the exchange of specific protocol messages.<\/li>\n\n\n\n<li><strong>Name Identifier Management Protocol<\/strong>\u00a0defines a mechanism for an identity provider to manage its name by changing the name identifier and the format of the name identifier or to notify other entities that a name identifier has been terminated.<\/li>\n\n\n\n<li><strong>Name Identifier Mapping Protocol<\/strong>&nbsp;defines a mechanism for mapping a user identifier across different service providers.<\/li>\n<\/ul>\n\n\n\n<p>These request\/response protocols are defined as part of SAML to enable systems to request authentication, respond to authentication requests and exchange assertions. These protocols are independent of the networking protocols that SAML messages are bound to for network transport.<\/p>\n\n\n\n<h3 id=\"saml-bindings\" class=\"wp-block-heading\"><strong>SAML bindings<\/strong><\/h3>\n\n\n\n<p>These are the formats specified for protocol messages to be embedded and transported over different transmission mechanisms. SAML depends on several other protocols that are used to format and exchange requests and responses. These include the following:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>XML<\/strong>\u00a0defines how messages are formatted.<\/li>\n\n\n\n<li><strong>Hypertext Transfer Protocol\u00a0<\/strong>(HTTP) is the protocol SAML uses to exchange messages.<\/li>\n\n\n\n<li><strong>SOAP<\/strong>\u00a0&#8212; originally standing for\u00a0Simple Object Access Protocol, though that meaning has dropped off &#8212; is the protocol used to encapsulate messages.<\/li>\n<\/ul>\n\n\n\n<p>SAML bindings define how protocol messages are transmitted. They use the transport protocols that enable communication between entities. SAML 2.0 defines the following bindings:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>HTTP Redirect Binding<\/strong>&nbsp;defines a format for exchanging SAML authentication messages in HTTP redirect messages.<\/li>\n\n\n\n<li><strong>HTTP POST Binding<\/strong>&nbsp;defines a format for exchanging SAML authentication messages in HTML forms.<\/li>\n\n\n\n<li><strong>HTTP Artifact Binding<\/strong>&nbsp;defines a format for exchanging SAML artifacts in HTML forms or in a string added to a URL.<\/li>\n\n\n\n<li><strong>SAML SOAP Binding<\/strong>&nbsp;defines a format for exchanging SAML authentication messages in SOAP messages.<\/li>\n\n\n\n<li><strong>Reverse SOAP (PAOS) Binding&nbsp;<\/strong>defines a mechanism for a web browser client to respond to SAML messages that are encoded in SOAP messages. It is sometimes referred to as PAOS, which is SOAP in reverse.<\/li>\n\n\n\n<li><strong>SAML URI Binding<\/strong>\u00a0defines a mechanism for retrieving a SAML assertion using a\u00a0Uniform Resource Identifier.<\/li>\n<\/ul>\n\n\n\n<p>The bindings enable authenticating systems to exchange assertions and requests using widely supported protocols.<\/p>\n\n\n\n<h3 id=\"saml-profiles\" class=\"wp-block-heading\"><strong>SAML profiles<\/strong><\/h3>\n\n\n\n<p>These determine how assertions, protocols and bindings are used together for interoperability in certain applications. A SAML profile consists of assertions, protocols and bindings. The profiles are used to define specific applications.<\/p>\n\n\n\n<p>Profiles defined for SAML 2.0 include the following:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Web browser SSO profile<\/strong>&nbsp;defines how SAML is used to implement SSO on web browsers.<\/li>\n\n\n\n<li><strong>Enhanced client and proxy profile<\/strong>\u00a0specifies how specialized clients or\u00a0gateway\u00a0proxies operate using SOAP or PAOS bindings.<\/li>\n\n\n\n<li><strong>Identity provider discovery profile<\/strong>&nbsp;defines a technique to give service providers access to identity providers a user previously visited.<\/li>\n\n\n\n<li><strong>Single logout profile<\/strong>\u00a0shows how the Single Logout Protocol works with bindings.<\/li>\n\n\n\n<li><strong>Assertion query\/request profile<\/strong>\u00a0specifies how SAML entities receive assertions over a synchronous binding like SOAP.<\/li>\n\n\n\n<li><strong>Artifact resolution profile<\/strong>&nbsp;defines how SAML artifacts are exchanged over specific protocols.<\/li>\n\n\n\n<li><strong>Name identifier management profile<\/strong>&nbsp;defines how SAML Name Identifier Management Protocol works over specific protocols.<\/li>\n\n\n\n<li><strong>Name identifier mapping profile<\/strong>&nbsp;defines how SAML Name Identifier Mapping Protocol works over specific protocols.<\/li>\n<\/ul>\n\n\n\n<p>These profiles can be configured to enable an SSO deployment.<\/p>\n\n\n\n<h2 id=\"what-is-saml-used-for\" class=\"wp-block-heading\"><strong>What is SAML used for?<\/strong><\/h2>\n\n\n\n<p>Organizations use SAML both for business-to-business and business-to-consumer applications. It is used to share user credentials across one or more networked systems. The SAML\u00a0framework\u00a0is designed to accomplish two things:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>user authentication<\/li>\n\n\n\n<li>user authorization<\/li>\n<\/ol>\n\n\n\n<p>SAML is most often used to implement SSO authentication systems that enable end users to log in to their networks once and be authorized to access multiple resources on that network. For example, SSO implemented with Microsoft Active Directory (<a href=\"https:\/\/www.techtarget.com\/searchwindowsserver\/definition\/Active-Directory\">AD<\/a>) can be integrated with SAML 2.0 authentication requests.<\/p>\n\n\n\n<p>Authentication is the process of determining whether an entity is what it claims to be. It is required before authorization, which is the process of determining whether the authenticated identity has permission to use a resource.<\/p>\n\n\n\n<p>SAML authentication depends on verifying user credentials, which, at a minimum, include user identity and password. SAML can also enable support for\u00a0multifactor authentication.<\/p>\n\n\n\n<h2 id=\"is-saml-authentication-the-same-thing-as-user-authorization\" class=\"wp-block-heading\"><strong>Is SAML authentication the same thing as user authorization?<\/strong><\/h2>\n\n\n\n<p>SAML is a technology for user authentication, not user authorization, and this is a key distinction. User authorization is a separate area of\u00a0identity and access management.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Authentication<\/strong>\u00a0refers to a user&#8217;s identity: who they are and whether their identity has been confirmed by a login process.<\/li>\n\n\n\n<li><strong>Authorization<\/strong>\u00a0refers to a user&#8217;s privileges or permissions: specifically, what actions they are allowed to perform within a company&#8217;s systems.<\/li>\n<\/ul>\n\n\n\n<p>Access management technologies handle user authorization. Access management platforms use several different authorization standards (one of which is OAuth), but not SAML.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-recommended-articles\"><span id=\"recommended-articles\"><strong>Recommended Articles <\/strong><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/businessyield.com\/tech\/technology\/cia-triad-in-cybersecurity-what-is-it-why-is-it-important\/\">CIA Triad in Cybersecurity: What Is It &amp; Why Is It Important?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/technology\/cybersecurity-risk-assessment-what-it-is-how-to-perform-it\/\">Cybersecurity Risk Assessment: What It Is &amp; How To Perform It<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/technology\/what-is-soar-in-cybersecurity-definition-tools-benefits\/\">What Is SOAR In Cybersecurity? Definition, Tools &amp; Benefits<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/technology\/air-gapped-computer-what-is-it-how-do-you-secure-one\/\">Air Gapped Computer: What Is It &amp; How Do You Secure One?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/technology\/how-to-start-coding-beginners-guide\/\">How To Start Coding: Beginner\u2019s Guide<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/technology\/delta-wi-fi-how-it-works-all-to-know\/\">Delta Wi-Fi: How It Works &amp; All to Know<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-references\"><span id=\"references\"><strong>References<\/strong><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.cloudflare.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Cloudflare<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.techtarget.com\/searchsecurity\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">TechTarget<\/a><\/li>\n<\/ul>\n","protected":false,"gt_translate_keys":[{"key":"rendered","format":"html"}]},"excerpt":{"rendered":"Security Assertion Markup Language (SAML) is an open standard for exchanging authentication and authorization data between parties, in&hellip;\n","protected":false,"gt_translate_keys":[{"key":"rendered","format":"html"}]},"author":290,"featured_media":14732,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[302],"tags":[],"class_list":{"0":"post-14731","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-security"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Is SAML: Definition And How It Works - Business Yield Technology<\/title>\n<meta name=\"description\" content=\"Security Assertion Markup Language (SAML) is an open standard for exchanging authentication and authorization data between parties.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/businessyield.com\/tech\/cyber-security\/what-is-saml-definition-and-how-it-works\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is SAML: Definition And How It Works - Business Yield Technology\" \/>\n<meta property=\"og:description\" content=\"Security Assertion Markup Language (SAML) is an open standard for exchanging authentication and authorization data between parties.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/businessyield.com\/tech\/cyber-security\/what-is-saml-definition-and-how-it-works\/\" \/>\n<meta property=\"og:site_name\" content=\"Business Yield Technology\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/Jay.Arnis\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-20T16:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Untitled-design-11.jpg?fit=1000%2C667&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jimmy Anisulowo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/forlahjay\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jimmy Anisulowo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/businessyield.com\/tech\/cyber-security\/what-is-saml-definition-and-how-it-works\/\",\"url\":\"https:\/\/businessyield.com\/tech\/cyber-security\/what-is-saml-definition-and-how-it-works\/\",\"name\":\"What Is SAML: Definition And How It Works - Business Yield Technology\",\"isPartOf\":{\"@id\":\"https:\/\/businessyield.com\/tech\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/businessyield.com\/tech\/cyber-security\/what-is-saml-definition-and-how-it-works\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/businessyield.com\/tech\/cyber-security\/what-is-saml-definition-and-how-it-works\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Untitled-design-11.jpg?fit=1000%2C667&ssl=1\",\"datePublished\":\"2023-11-20T16:00:00+00:00\",\"author\":{\"@id\":\"https:\/\/businessyield.com\/tech\/#\/schema\/person\/0f5b3b62b69726a967e6d217a4d242ff\"},\"description\":\"Security Assertion Markup Language (SAML) is an open standard for exchanging authentication and authorization data between parties.\",\"breadcrumb\":{\"@id\":\"https:\/\/businessyield.com\/tech\/cyber-security\/what-is-saml-definition-and-how-it-works\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/businessyield.com\/tech\/cyber-security\/what-is-saml-definition-and-how-it-works\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/businessyield.com\/tech\/cyber-security\/what-is-saml-definition-and-how-it-works\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Untitled-design-11.jpg?fit=1000%2C667&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Untitled-design-11.jpg?fit=1000%2C667&ssl=1\",\"width\":1000,\"height\":667,\"caption\":\"Image credits: CAST Highlights\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/businessyield.com\/tech\/cyber-security\/what-is-saml-definition-and-how-it-works\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/businessyield.com\/tech\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is SAML: Definition And How It Works\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/businessyield.com\/tech\/#website\",\"url\":\"https:\/\/businessyield.com\/tech\/\",\"name\":\"Business Yield Technology\",\"description\":\"Best Tech Reviews, Apps, Phones, &amp; Gaming\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/businessyield.com\/tech\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/businessyield.com\/tech\/#\/schema\/person\/0f5b3b62b69726a967e6d217a4d242ff\",\"name\":\"Jimmy Anisulowo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/businessyield.com\/tech\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b20d2d093f1362590dc5b5f8b8cfb36e53decf98e57d0121be53eb533dc1f2a7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b20d2d093f1362590dc5b5f8b8cfb36e53decf98e57d0121be53eb533dc1f2a7?s=96&d=mm&r=g\",\"caption\":\"Jimmy Anisulowo\"},\"description\":\"Jimmy generally lives his life by one dogma: steady improvement. This has taken him on a relentless pursuit of knowledge in diverse fields such as business, tech, insurance, health and many others. With a background in content creation and digital marketing plus over ten years of writing and research experience, he implements an expert's view to help his audiences gain valuable insight. He is also an avid reader, gamer, drummer, full-blown metalhead, and all-round fun gi.\",\"sameAs\":[\"https:\/\/www.facebook.com\/Jay.Arnis\",\"https:\/\/www.instagram.com\/forlahjay\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/forlahjay\"],\"url\":\"https:\/\/businessyield.com\/tech\/author\/jimmy\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is SAML: Definition And How It Works - Business Yield Technology","description":"Security Assertion Markup Language (SAML) is an open standard for exchanging authentication and authorization data between parties.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/businessyield.com\/tech\/cyber-security\/what-is-saml-definition-and-how-it-works\/","og_locale":"en_US","og_type":"article","og_title":"What Is SAML: Definition And How It Works - Business Yield Technology","og_description":"Security Assertion Markup Language (SAML) is an open standard for exchanging authentication and authorization data between parties.","og_url":"https:\/\/businessyield.com\/tech\/cyber-security\/what-is-saml-definition-and-how-it-works\/","og_site_name":"Business Yield Technology","article_author":"https:\/\/www.facebook.com\/Jay.Arnis","article_published_time":"2023-11-20T16:00:00+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Untitled-design-11.jpg?fit=1000%2C667&ssl=1","type":"image\/jpeg"}],"author":"Jimmy Anisulowo","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/forlahjay","twitter_misc":{"Written by":"Jimmy Anisulowo","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/businessyield.com\/tech\/cyber-security\/what-is-saml-definition-and-how-it-works\/","url":"https:\/\/businessyield.com\/tech\/cyber-security\/what-is-saml-definition-and-how-it-works\/","name":"What Is SAML: Definition And How It Works - Business Yield Technology","isPartOf":{"@id":"https:\/\/businessyield.com\/tech\/#website"},"primaryImageOfPage":{"@id":"https:\/\/businessyield.com\/tech\/cyber-security\/what-is-saml-definition-and-how-it-works\/#primaryimage"},"image":{"@id":"https:\/\/businessyield.com\/tech\/cyber-security\/what-is-saml-definition-and-how-it-works\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Untitled-design-11.jpg?fit=1000%2C667&ssl=1","datePublished":"2023-11-20T16:00:00+00:00","author":{"@id":"https:\/\/businessyield.com\/tech\/#\/schema\/person\/0f5b3b62b69726a967e6d217a4d242ff"},"description":"Security Assertion Markup Language (SAML) is an open standard for exchanging authentication and authorization data between parties.","breadcrumb":{"@id":"https:\/\/businessyield.com\/tech\/cyber-security\/what-is-saml-definition-and-how-it-works\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/businessyield.com\/tech\/cyber-security\/what-is-saml-definition-and-how-it-works\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/businessyield.com\/tech\/cyber-security\/what-is-saml-definition-and-how-it-works\/#primaryimage","url":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Untitled-design-11.jpg?fit=1000%2C667&ssl=1","contentUrl":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Untitled-design-11.jpg?fit=1000%2C667&ssl=1","width":1000,"height":667,"caption":"Image credits: CAST Highlights"},{"@type":"BreadcrumbList","@id":"https:\/\/businessyield.com\/tech\/cyber-security\/what-is-saml-definition-and-how-it-works\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/businessyield.com\/tech\/"},{"@type":"ListItem","position":2,"name":"What Is SAML: Definition And How It Works"}]},{"@type":"WebSite","@id":"https:\/\/businessyield.com\/tech\/#website","url":"https:\/\/businessyield.com\/tech\/","name":"Business Yield Technology","description":"Best Tech Reviews, Apps, Phones, &amp; Gaming","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/businessyield.com\/tech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/businessyield.com\/tech\/#\/schema\/person\/0f5b3b62b69726a967e6d217a4d242ff","name":"Jimmy Anisulowo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/businessyield.com\/tech\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b20d2d093f1362590dc5b5f8b8cfb36e53decf98e57d0121be53eb533dc1f2a7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b20d2d093f1362590dc5b5f8b8cfb36e53decf98e57d0121be53eb533dc1f2a7?s=96&d=mm&r=g","caption":"Jimmy Anisulowo"},"description":"Jimmy generally lives his life by one dogma: steady improvement. This has taken him on a relentless pursuit of knowledge in diverse fields such as business, tech, insurance, health and many others. With a background in content creation and digital marketing plus over ten years of writing and research experience, he implements an expert's view to help his audiences gain valuable insight. He is also an avid reader, gamer, drummer, full-blown metalhead, and all-round fun gi.","sameAs":["https:\/\/www.facebook.com\/Jay.Arnis","https:\/\/www.instagram.com\/forlahjay\/","https:\/\/x.com\/https:\/\/twitter.com\/forlahjay"],"url":"https:\/\/businessyield.com\/tech\/author\/jimmy\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Untitled-design-11.jpg?fit=1000%2C667&ssl=1","jetpack_sharing_enabled":true,"gt_translate_keys":[{"key":"link","format":"url"}],"_links":{"self":[{"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/posts\/14731","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/users\/290"}],"replies":[{"embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/comments?post=14731"}],"version-history":[{"count":1,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/posts\/14731\/revisions"}],"predecessor-version":[{"id":14733,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/posts\/14731\/revisions\/14733"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/media\/14732"}],"wp:attachment":[{"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/media?parent=14731"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/categories?post=14731"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/tags?post=14731"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}