Click here to Skip to main content
13,352,879 members (48,978 online)
Click here to Skip to main content
Add your own
alternative version

Tagged as


8 bookmarked
Posted 27 Jul 2012

Basics of SAML

, 27 Jul 2012
Rate this:
Please Sign up or sign in to vote.
Before jumping into practical implementation of SSO, lets know the basics of SAML.


Security Assertion Markup Language (SAML) is an XML based framework developed by the Organization for the Advancement of Structured Information Standards (OASIS), used for the exchange of security information between different parties. This is an open standard that can be used to exchange security information between different products. 


  • SAML V1.0 became an OASIS standard in November 2002. SAML V1.1
  • In September 2003 and has seen significant success, gaining momentum in financial services, higher education, government, and other industry segments.
  • # In 2005, SAML V2.0 unifies the building blocks of federated identity in SAML V1.1 with input from higher

education's Shibboleth initiative and the Liberty Alliance's Identity Federation Framework.

The benefits of SAML include:

  • Platform neutrality

    SAML abstracts the security framework away from platform architectures and particular vendor implementations. Making security more independent of application logic is an important tenet of Service-Oriented Architecture.

  • Loose coupling of directories

    SAML does not require user information to be maintained and synchronized between directories.

  • Improved online experience for end users

    SAML enables single sign-on by allowing users to authenticate at an identity provider and then access service providers without additional authentication. In addition, identity federation (linking of multiple identities) with SAML allows for a better-customized user experience at each service while promoting privacy.

  • Reduced administrative costs for service providers

     Using SAML to "reuse" a single act of authentication (such as logging in with a username and password) multiple times across multiple services can reduce the cost of maintaining account information. This burden is

  • Risk transference  

    SAML can act to push responsibility for proper management of identities to the identity provider, which is more often compatible with its business model than that of a service provider.

Where SAML will be used?

Web single sign on

In web SSO, a user authenticates to one web site and then, without additional authentication, is able to access some personalized or customized resources at another site. SAML enables web SSO through the communication of an authentication assertion from the first site to the second which, if confident of the origin of the assertion, can choose to log in the user as if they had authenticated directly.

Attribute-Based Authorization

Similar to the Web SSO scenario, the attribute based authorization model has one web site communicating identity information about a subject to another web site in support of some transaction. However, the identity information may be some characteristic of the subject (such as a person's role in a B2B scenario) rather than, or in addition to, information about when and how the person was authenticated. The attribute-based authorization model is important when the individual's particular identity is either not important, should not be shared for privacy reasons, or is insufficient on its own.

Securing Web Services

SAML assertions can be used within SOAP messages in order to convey security and identity information between actors in web service interactions. The SAML Token Profile produced by the OASIS Web Services Security (WSS) TC specifies how SAML assertions should be used for  this purpose with the WS-Security framework. The Liberty Alliance's Identity Web Service Framework (ID-WSF) builds on these specifications to use SAML assertions for enabling secure and privacy respecting access to web services.


An assertion is a package of information that supplies one or more statements made by a SAML authority. SAML defines three different kinds of assertion statement that can be created by a SAML authority.

  • Authentication: The specified subject was authenticated by a particular means at a particular time. This kind of statement is typically generated by a SAML authority called an identity provider, which is in charge of authenticating users and keeping track of other information about them.
  • Attribute: The specified subject is associated with the supplied attributes.
  • Authorization Decision / Entitlement Info: A request to allow the specified subject to access the specified resource has been granted or denied.


SAML defines a number of request/response protocols that allow service providers to:

  • Request from a SAML authority one or more assertions (includes a direct request of the desired assertions, as well as querying for assertions that meet particular criteria)
  • Request that an identity provider authenticate a principal and return the corresponding assertion
  • Request that a name identifier be registered
  • Request that the use of an identifier be terminated
  • Retrieve a protocol message that has been requested by means of an artifact
  • Request a near-simultaneous logout of a collection of related sessions ("single logout")
  • Request a name identifier mapping


Mappings from SAML request-response message exchanges into standard messaging or communication protocols are called SAML protocol bindings. For instance, the SAML SOAP Binding defines how SAML protocol messages can be communicated within SOAP messages, whilst the HTTP Redirect binding defines how to pass protocol messages through HTTP redirection.


Generally, a profile of SAML defines constraints and/or extensions in support of the usage of SAML for a particular application, the goal being to enhance interoperability by removing some of the flexibility inevitable in a general-use standard. For instance, the Web Browser SSO Profile specifies how SAML authentication assertions are communicated between an identity provider and service provider to enable single sign-on for a browser user.

The Web SSO Profile details how to use the SAML Authentication Request/Response protocol in conjunction with different combinations of the HTTP Redirect, HTTP POST, HTTP Artifact, and SOAP bindings.

Another type of SAML profile is an attribute profile. SAML defines a series of attribute profiles to provide specific rules for interpretation of attributes in SAML attribute assertions. An example is the X.500/LDAP profile, describing how to carry X.500/LDAP attributes within SAML attribute.

In next posts, lets see the practical implementation of SSO and how to use SAML 2.0.

Is it helpful for you? Kindly let me know your comments / Questions.


This article, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)


About the Author

You may also be interested in...

Comments and Discussions

QuestionWhere can I find your next posts? Pin
tungpt24726-Nov-17 18:20
membertungpt24726-Nov-17 18:20 
Questionprocess of web browser,Service Provider and iDP ? Pin
Member 121781027-Jan-16 20:04
memberMember 121781027-Jan-16 20:04 
GeneralMy vote of 5 Pin
Member 849055710-Sep-13 23:03
memberMember 849055710-Sep-13 23:03 
GeneralMy vote of 4 Pin
Member 17933011-Oct-12 4:15
memberMember 17933011-Oct-12 4:15 
AnswerFormating Pin
Clifford Nelson26-Jul-12 11:55
memberClifford Nelson26-Jul-12 11:55 
GeneralRe: Formating Pin
PratapReddyP26-Jul-12 16:32
memberPratapReddyP26-Jul-12 16:32 
AnswerRe: Formating Pin
Clifford Nelson26-Jul-12 19:38
memberClifford Nelson26-Jul-12 19:38 

General General    News News    Suggestion Suggestion    Question Question    Bug Bug    Answer Answer    Joke Joke    Praise Praise    Rant Rant    Admin Admin   

Use Ctrl+Left/Right to switch messages, Ctrl+Up/Down to switch threads, Ctrl+Shift+Left/Right to switch pages.

Permalink | Advertise | Privacy | Terms of Use | Mobile
Web02 | 2.8.180111.1 | Last Updated 27 Jul 2012
Article Copyright 2012 by PratapReddyP
Everything else Copyright © CodeProject, 1999-2018
Layout: fixed | fluid