SAML
Securing Cloud Applications: SCIM’s Role in Modern Identity Management
Deepak Gupta - Tech Entrepreneur, Cybersecurity Author | | Access control, authorization, Digital Identity, iam, identity management, SAML, SCIM
Uncover SCIM's architecture, detailed workflows, and seamless interaction with SSO. Learn how this powerful protocol standardizes and automates identity management across cloud applications, enhancing security and efficiency ...
OIDC vs SAML: A Comprehensive Technical Comparison
Deepak Gupta - Tech Entrepreneur, Cybersecurity Author | | Authentication, Digital Identity, identity management, JWT Authentication, OIDC, SAML
Dive into the identity and access management world with a technical comparison of OpenID Connect (OIDC) and Security Assertion Markup Language (SAML). This technical guide explores architectures, key differences, and use cases ...
What is Silver SAML Vulnerability and How Can We Protect Our Digital Identities?
This blog explores the Silver SAML vulnerability and its significance in protecting digital identities. From SAML basics to mitigation tactics, it provides essential insights for safeguarding against cyber threats ...
Demystifying JWT, OAuth, OIDC, and SAML: A Technical Guide
Deepak Gupta - Tech Entrepreneur, Cybersecurity Author | | Authentication, authorization, Digital Identity, iam, jwt, SAML
Dive into a clear technical guide explaining JWT, OAuth, OIDC, and SAML. Learn their strengths and weaknesses and use cases to choose the right approach for your next project. Stay updated with ...
Why You Should Avoid Customizing PeopleSoft To Enable Single Sign-On (SAML/ADFS)
Don’t Risk the Security of your Data with Customized SSO SAML/ADFS Integration for PeopleSoft On a recent discovery call, a Senior Software Engineer shared how they’re “ripping out” a custom-built PeopleSoft single ...
SOGo and PacketFence Impacted by SAML Implementation Vulnerabilities
Part of Akamai's incident management process for vulnerabilities in third party software involves verifying potential impact in other systems using the same or similar libraries. While following that process when addressing the ...
SAML Implementation Vulnerability Impacting Some Akamai Services
This blog post provides an overview of a vulnerability discovered in Akamai's Enterprise Application Access (EAA) product which has been patched. This vulnerability could have allowed an actor to impersonate an authorized ...
Hackers Didn’t Only Use SolarWinds to Break In, Says CISA
It wasn’t just the SolarWinds supply-chain hack. There were other ways that the “Russian” hackers broke into countless government agencies and private organizations ...
Security Boulevard
SAML/SSO Authentication and Conan in Nexus Repository 3.22
Introducing the release of Nexus Repository 3.22. Our product teams are excited to announce SAML/SSO authentication for Nexus Repository Pro. In addition to SAML/SSO, this release includes proxy support for Conan native ...
SAML, The p0wnage
Oh, How Sweet It Is*... via the superlative Anitian Blog, and of course - writer Rick Osgood, comes this tremendous piece - titled 'Owning SAML, in which, the p0wning of SAML, and ...