Preview

Saml vs. Oath

Good Essays
Open Document
Open Document
709 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Saml vs. Oath
While researching for this assignment, I came across a lot of good points about each access control measure, along with some bad points. Each measure was implemented with the best intentions for the user. The fact that it simplifies log on procedures is a big factor. Security-Assertion Markup Language is an XML based open standard for exchanging authentication and authorization data between security domains. Open Authorization allows you to use a common username and password to access different sites. These sites are linked together in one form or another to share information on these sites. Now granted not all information on the sites are shared, but some things such as address book, what you read, watch, or even sometimes your hobbies show up. Security Assertion Markup Language uses assumptions that the user is enrolled with an identity provider. This identity provider is expected to provide local authentication services to the principal. However, SAML does not specify the implementation of these local services; indeed, SAML does not care how local authentication services are implemented. With this, a service provider relies on an identity provider to identify a principal. At the principal's request, the identity provider passes a SAML assertion to the service provider. On the basis of this assertion, the service provider makes an access control decision. SAML ensures the resource in the assertion matches that configured in the filter, checks the client's access permissions for the resource, ensures the assertion has not expired. The main problem with Security Assertion Markup Language is trying to solve the Web Based Single Sign On. This is where Open Authorization kind of excelled where SAML did not. OAUTH uses single sign on to help a user connect to different sites through one common username and password. For instance, with everything seeming to revolve around Facebook nowadays, websites such as Pinterest and Yahoo will use your facebook

You May Also Find These Documents Helpful

  • Good Essays

    • Authentication – the process for “trust” connection establishing between the server and the applier;…

    • 767 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The process of confirming a user's identity, usually by requiring the user to supply some sort of token, such as a password or a certificate, is called authentication : Authentication…

    • 1432 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    IS3340-Unit 2-Assignment 2

    • 1549 Words
    • 6 Pages

    vi. Each user and workforce member must ensure that their assigned User Identification is appropriately protected and only used for legitimate access to networks, systems, or applications. If a user or workforce members believes their user identification has been comprised, they must report that security incident to the appropriate Security Officer…

    • 1549 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Conducting annual security training for the user in the user domain will cover the Acceptable Use Policy (AUP). Informing the users will be of what is acceptable and unacceptable use of the system. This layer also needs constant monitoring.…

    • 634 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    ISSC 363 Week 2 Quiz

    • 320 Words
    • 2 Pages

    After implementing several security controls, what should be done to ensure the controls are performing as expected?…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The authentication process is a necessity for safeguarding systems against various forms of security threats, such as password-cracking tools, brute-force or wordbook attacks, abuse of system access rights, impersonation of attested users, and last but not least reply attacks just to name a few. In addition, it is imperative that authentication policies are interchangeable with the organizations in which information is being exchanged if resources are being shared between alternative organizations.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    2. What is an Access Control List (ACL) and how is it useful in a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Chapter 9 ISS

    • 620 Words
    • 3 Pages

    14 True or False: Authorization is a security objective that binds a message or data to a specific entity and adds value to relationships between businesses.…

    • 620 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    profile specifies the SAML bindings that may be used in its context. Both SAML profiles…

    • 2032 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Quiz 1

    • 308 Words
    • 2 Pages

    2. Which among the following is the best reason to define security groups while configuring access rights for users in a network?…

    • 308 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Because verification process main aim is to prevent unauthorized persons from using the services[6]. Because verification process main aim is to prevent unauthorized persons from using the services[6]. Because verification process main aim is to prevent unauthorized persons from using the services[6].…

    • 42 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Access control methods are a process that determines what services or company resources an employee has access to. These methods will be used to determine what an employee can and cannot access, as well as ways to make sure that all employees are being granted the correct access levels. Authentication is a process of determining whether someone or something is who or what they say they are. Authentication can be a form of determining whether an employee is actually the person that they say they are. Employees can be authenticated by being able to answer personal questions that only they would know or by providing a username and password that only the employee knows.…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Satisfactory Essays

    Linux admin research 2

    • 430 Words
    • 2 Pages

    Security Enhanced Linux is an extension that is designed to enforce strict access controls that confine processes to the minimum amount of privilege that they require. It was release late in 2000 by the US National Security Agency (NSA), SELinux was created to help such organizations that need heavy security like NAI labs, Secure computing Corporation, and MITRE Corporation. Security experts use a number of models to describe security access control systems. The most common is the Discretionary Access Control (DAC).…

    • 430 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    |Authentication is a process in which the user’s credentials are used to verify|Authorization is a process in which the |…

    • 1819 Words
    • 8 Pages
    Good Essays
  • Better Essays

    and acceptance across diverse points and contexts and application of the verification and authentication services within and outside the country.…

    • 2143 Words
    • 9 Pages
    Better Essays