Securing Cloud Applications: SCIM's Role in Modern Identity Management

Securing Cloud Applications: SCIM’s Role in Modern Identity Management

Uncover SCIM's architecture, detailed workflows, and seamless interaction with SSO. Learn how this powerful protocol standardizes and automates identity management across cloud applications, enhancing security and efficiency ...
OIDC vs SAML: A Comprehensive Technical Comparison

OIDC vs SAML: A Comprehensive Technical Comparison

Dive into the identity and access management world with a technical comparison of OpenID Connect (OIDC) and Security Assertion Markup Language (SAML). This technical guide explores architectures, key differences, and use cases ...
What is Silver SAML Vulnerability and How Can We Protect Our Digital Identities?

What is Silver SAML Vulnerability and How Can We Protect Our Digital Identities?

This blog explores the Silver SAML vulnerability and its significance in protecting digital identities. From SAML basics to mitigation tactics, it provides essential insights for safeguarding against cyber threats ...
Demystifying JWT, OAuth, OIDC, and SAML: A Technical Guide

Demystifying JWT, OAuth, OIDC, and SAML: A Technical Guide

Dive into a clear technical guide explaining JWT, OAuth, OIDC, and SAML. Learn their strengths and weaknesses and use cases to choose the right approach for your next project. Stay updated with ...

Why You Should Avoid Customizing PeopleSoft To Enable Single Sign-On (SAML/ADFS)

Don’t Risk the Security of your Data with Customized SSO SAML/ADFS Integration for PeopleSoft On a recent discovery call, a Senior Software Engineer shared how they’re “ripping out” a custom-built PeopleSoft single ...
SOGo and PacketFence Impacted by SAML Implementation Vulnerabilities

SOGo and PacketFence Impacted by SAML Implementation Vulnerabilities

Part of Akamai's incident management process for vulnerabilities in third party software involves verifying potential impact in other systems using the same or similar libraries. While following that process when addressing the ...
SAML Implementation Vulnerability Impacting Some Akamai Services

SAML Implementation Vulnerability Impacting Some Akamai Services

| | Cloud Security, SAML, security
This blog post provides an overview of a vulnerability discovered in Akamai's Enterprise Application Access (EAA) product which has been patched. This vulnerability could have allowed an actor to impersonate an authorized ...
Hackers Didn’t Only Use SolarWinds to Break In, Says CISA

Hackers Didn’t Only Use SolarWinds to Break In, Says CISA

It wasn’t just the SolarWinds supply-chain hack. There were other ways that the “Russian” hackers broke into countless government agencies and private organizations ...
Security Boulevard

SAML/SSO Authentication and Conan in Nexus Repository 3.22

Introducing the release of Nexus Repository 3.22. Our product teams are excited to announce SAML/SSO authentication for Nexus Repository Pro. In addition to SAML/SSO, this release includes proxy support for Conan native ...
SAML, The p0wnage

SAML, The p0wnage

Oh, How Sweet It Is*... via the superlative Anitian Blog, and of course - writer Rick Osgood, comes this tremendous piece - titled 'Owning SAML, in which, the p0wning of SAML, and ...

Application Security Check Up