SuperTokenssupertokens.hashnode.dev·Aug 7, 2023SAML vs OAuth: Choosing the right protocol for authenticationIntroduction SAML (Security Assertion Markup Language) and OAuth (Open Authorization) are key protocols for authentication and authorization. While both protocols serve essential purposes, they possess distinct characteristics that make them suitable...Discussauthentication
Emmanuel GautierforCerberAuthwww.cerberauth.com·Aug 1, 2023Introduction to KeycloakWhat is Identity and Access Management (IAM)? IAM refers to a framework of policies, processes, technologies, and tools that facilitate the management of identities and their access to various resources. In simple terms, IAM allows to control who has...DiscussGet Started with KeycloakIAM
Deepak PrabhakaraforBoxyHQ: Security Building Blocks for Devboxyhq.hashnode.dev·Jul 25, 2023BoxyHQ + Cerbos: Merging SSO and AuthorizationIn this article, we will see how to enable Enterprise SSO login (based on the SAML single sign-on protocol) using Okta for your Next.js app and relay role-based access directly from the Identity Provider to Cerbos. We'll be using BoxyHQ's open-source...Discuss·27 likesauthorization
Abigaila Ekiertabigaila-ekiert.hashnode.dev·Jun 4, 2023SAML SSO implementation exampleNot that long ago I needed to implement an SSO solution. I had two objectives - it had to support SAML and I should use one of the existing libraries to do so. After doing initial research and settling on the library (spoiler alert! passport-saml - i...DiscussSSO
Dannel Bothellodanbothello.hashnode.dev·Apr 24, 2023Secure your application and website with SSOSecurity is a top priority for any website in the modern online environment. It is crucial to make sure that your website is safe and shielded from any potential risks given the rise in cyberattacks. Implementing Single Sign-On (SSO) for your website...DiscussASP.NET
Alessandro GaggiaforLeapp blogblog.leapp.cloud·Apr 21, 2023How to fix response did not contain a valid saml assertionIf you read this article, you are managing user identities outside of AWS and using Identity Provider (IdP) Federation to give these external identities permission to use AWS resources in your account. In this authentication process, one of the most ...Discuss·109 readsHow to fixSAML
Sanchit Khuranageniuslearner.hashnode.dev·Feb 12, 2023An Introduction to Security Assertion Markup Language (SAML)Security Assertion Markup Language (SAML) is an XML-based standard for exchanging authentication and authorization data between parties, particularly between an identity provider (IdP) and a service provider (SP). It provides a framework for secure c...Discuss·26 readsSAML
FusionAuth teamforFusionAuth Blogfusionauth.hashnode.dev·Jan 9, 2023OIDC vs SAML: What's the Difference?It’s essential for digital platforms to keep their data and resources secure, which is why authentication protocols are so necessary. Authentication protocols are sets of rules used to determine the identity of an entity (such as an end user, applica...Discuss·41 readsoauth
Denil Gabaniblog.denilgabani.com·Jan 8, 2023Authentication Methods in a nutshellIn technical or non-technical you must have come across the word Authentication. Here we will go through it from a technical perspective. What is Authentication? Authentication is the process of verifying that someone is who they claim to be. Why do ...Discuss·72 readsauthentication
TutorialBoyforTUTORIALBOYtutorialboy24.hashnode.dev·Nov 22, 2022A Brief Introduction to SAML Security VectorSource :- https://tutorialboy24.blogspot.com/2022/11/a-brief-introduction-to-saml-security.html SAML SAML started in 2001, and the final SAML 2.0 version was released in 2005. Since then, no major version has been released, and SAML 2.0 has continued...Discuss·32 reads#cybersecurity