Skip to main content

Overall SAML principles and terms

SAML is an open standard for exchanging authentication and authorization data between parties, specifically between an identity provider and a service provider. This document provides anAn overview of SAML principles and key terms to help you effectively configure and manage SAML with Knocknoc.

What is SAML?

SAML is an open standard for exchanging authentication data between parties, specifically between an identity provider and a service provider. An XML-based framework for communicating user authentication, entitlement, and attribute information. It allows secure domains to exchange user data, enhancing the ability to support single sign-on (SSO) – a process that allows users to access multiple services with one set of credentials.

Key Components of SAML

  • Identity Provider (IdP): An entity that creates, maintains, and manages identity information while providing authentication services to service providers.providers EG(e.g OKTA, EntraID, JumpcloudJumpcloud).
  • Service Provider (SP): An entity that provides services, like web applications, and relies on the IdP for authentication.authentication EG(e.g KnocknocKnocknoc).
  • Assertion: A package of information that supplies one or more statements made by the IdP about a user. This can include attributes about the user, authentication information, and entitlements.

SAML Assertions

Assertions are the key element of SAML. They are XML documents that contain:

  • Authentication Statement: Information about the authentication act (e.g.,g when and how the user authenticated).
  • Attribute Statement: Information about the user (e.g.,g user’s name, email).
  • Authorization Decision Statement: Information about what the user is allowed to do.

SAML Protocols, Bindings and Profiles

SAML defines a set of protocols for requesting and delivering assertions:

  • Authentication Request Protocol: Used by SPs to request authentication from an IdP.
  • Assertion Query/Request Protocol: Allows SPs to request specific assertions.
  • Bindings:

    Bindings are the mechanismsMechanisms used to transport SAML messages between parties.parties Examples include(e.g HTTP Redirect, HTTP POST,POST and SOAP.

    SOAP).
  • Profiles: are methodsMethods of combining various SAML elements (assertions, protocols, and bindings) to support specific use cases. The most common is the Web Browser SSO Profile.

  • Security Considerations

    SAML is a more secure way to authenticate users, as the SP never getsreceives the password of the user. However, security is paramount in SAML implementations. Key considerations include:

    • Message Confidentiality and Integrity: Using digital signatures and encryption to protect messages. Knocknoc signs messages with a separate certificate.
    • Trust Establishment: Ensuring that messages are exchanged between trusted parties, often through X.509 certificates. You will need proper trusted SSL certificates when working with SAMLSAML.

    Implementing SAML in Knocknoc

    When configuring SAML in Knocknoc:

    1. Identify Your IdP and SP: Knocknoc is the SP, and your provider is the IdP (eg Okta)
    2. Configure Assertions: Customize the assertions to include the necessary user information.
    3. Select Bindings and Profiles: Choose appropriate bindings and profiles based on your use case.
    4. Test the SAML Flow: Ensure that the authentication flow works as expected and is secure.
    5. Monitor and Update: Regularly monitor the SAML setup and update as necessary, considering any new security patches or compliance requirements.