zlacker

[parent] [thread] 68 comments
1. thramp+(OP)[view] [source] 2020-04-14 16:23:52
This is a great change! One request: I wish that SAML was not an enterprise feature. SAML ought be a basic security feature like 2FA—it's especially valuable for open source teams who might use a mixture of services, and an easily accessible and cheap SSO solution would go a long way in raising the security bar for all teams, not just open source teams.
replies(7): >>vermor+F >>JMTQp8+l1 >>vptr+c2 >>albert+w4 >>Saaste+05 >>tobinf+q5 >>tptace+tf
2. vermor+F[view] [source] 2020-04-14 16:26:59
>>thramp+(OP)
Agreed. SAML even makes sense for solo dev.
replies(2): >>nogabe+h4 >>harha+D5
3. JMTQp8+l1[view] [source] 2020-04-14 16:29:48
>>thramp+(OP)
Stuff like SAML is kind of the only leverage freemium SaaS has for rationalizing charging enterprise customers.
replies(1): >>atonse+S3
4. vptr+c2[view] [source] 2020-04-14 16:33:41
>>thramp+(OP)
Agree. I sell simple sass product myself and offer SAML to everyone. I view security as a basic right, not something to be used to extract more money for. Charging for additional features is ok, charging for keeping your account more secure is just plain wrong.
replies(1): >>hirako+J4
◧◩
5. atonse+S3[view] [source] [discussion] 2020-04-14 16:40:36
>>JMTQp8+l1
Not true. There are other things (like audit logs, invoice/PO payments, better support) that enterprises will still want.
replies(3): >>ryanis+39 >>Corrad+ut1 >>JMTQp8+WD1
◧◩
6. nogabe+h4[view] [source] [discussion] 2020-04-14 16:42:03
>>vermor+F
So you care a lot about this, but not $4/month care?
replies(2): >>dfabul+J5 >>Spivak+Je1
7. albert+w4[view] [source] 2020-04-14 16:43:11
>>thramp+(OP)
+1

Even the ability to just “login with gmail” for non-enterprise accounts would be huge

◧◩
8. hirako+J4[view] [source] [discussion] 2020-04-14 16:43:34
>>vptr+c2
But saml is for integration (SSO). Github provides 2fa for free.

What enterprise is paying is the convenience, not security itself.

replies(1): >>tptace+ug
9. Saaste+05[view] [source] 2020-04-14 16:44:29
>>thramp+(OP)
SAML (and 2FA to a lesser extent) comes with some serious support burdens on the companies offering it. There's a long tail of more or less broken SAML implementations on both the service and identity provider sides, provisioning issues, configuration issues, "Sally can't login on Tuesdays" issues, duplicated slightly-inconsistent data in IdP and Service side records issues...

If you as a SaaS provider outsource your SAML integration to a third party provider like Okta or Auth0, the auth provider pricing is immediately on a "call us" tier, with a per-federation pricing in the low four figures for each company connecting via SAML. Let me just state that again, to have company X connect to my SaaS via SAML, I as the SaaS provider have to pay my auth provider $X,000 per year for the privilege, not counting the base enterprise tier pricing for the auth.

replies(4): >>derefr+U9 >>cactus+Ja >>closep+Ic >>Haegin+QJ
10. tobinf+q5[view] [source] 2020-04-14 16:46:26
>>thramp+(OP)
I'd never heard of SAML before. Is it like a more complicated version of OAuth?
replies(4): >>jaywal+J7 >>kube-s+S7 >>tptace+eg >>cactus+Vl
◧◩
11. harha+D5[view] [source] [discussion] 2020-04-14 16:47:24
>>vermor+F
could you elaborate further with use-cases?
replies(2): >>tiffan+u7 >>eastba+MA
◧◩◪
12. dfabul+J5[view] [source] [discussion] 2020-04-14 16:48:03
>>nogabe+h4
SAML is an enterprise feature; it's $21/user/month.
◧◩◪
13. tiffan+u7[view] [source] [discussion] 2020-04-14 16:56:25
>>harha+D5
Not having to create separate usernames and passwords with yet another service (GitHub)
replies(1): >>m01+od
◧◩
14. jaywal+J7[view] [source] [discussion] 2020-04-14 16:57:34
>>tobinf+q5
Basically, yes. Give me a choice between SAML and OIDC, and I'll choose OIDC every single time.
◧◩
15. kube-s+S7[view] [source] [discussion] 2020-04-14 16:58:07
>>tobinf+q5
SAML has been around longer and handles AuthN and AuthZ

OAuth only does AuthZ. I've always found OAuth more complicated because you have to combine it with other technologies to get AuthN

replies(2): >>gknoy+Na >>thinkh+Hb
◧◩◪
16. ryanis+39[view] [source] [discussion] 2020-04-14 17:02:58
>>atonse+S3
Yeah but considering SAML is one of the primary asks of enterprise, it kind of makes it a big selling point.
replies(1): >>Spivak+re1
◧◩
17. derefr+U9[view] [source] [discussion] 2020-04-14 17:07:00
>>Saaste+05
Sounds like SAML needs the same "everyone gets together to make a FOSS implementation that knows about the weird quirks of all the implementations it interacts with" approach that e.g. the Samba project was founded upon.
replies(1): >>Saaste+Gf
◧◩
18. cactus+Ja[view] [source] [discussion] 2020-04-14 17:11:00
>>Saaste+05
This doesn't make sense. Login of any kind can be a tricky problem, you need to handle passwords, rate limits, email verification, password resets, etc. In most popular web frameworks there are libraries you can drop-in that handle all of this for you (like Devise in rails). There are drop-in libraries like OmniAuth (again for ruby/rails) to make handling multiple types of Oauth login simple.

The same could clearly be done for SAML (and I've even implemented SAML and SCIM auth and user management for Okta before in an app, it's not difficult).

The problem is that the only organizations that would make this single issue of SSO support a deal-breaker are bigger companies who can afford to be upsold, so everyone treats this as an up-sell feature. This comes at the expense of the smaller companies, who can't afford to care as much about security. The industry should be making things secure by default as much as possible, and there's a big gap here in what basically every SAAS company is doing.

replies(2): >>Saaste+ud >>vetina+fv
◧◩◪
19. gknoy+Na[view] [source] [discussion] 2020-04-14 17:11:28
>>kube-s+S7
For those like me who had never heard these abbreviations:

AuthN: Authentication (who you are) AuthZ: Authorization (what you are allowed to do)

◧◩◪
20. thinkh+Hb[view] [source] [discussion] 2020-04-14 17:15:19
>>kube-s+S7
OpenID Connect is the standardized AuthN process built on top of OAuth. It’s “on top of” but in practice it’s a simplification if OAuth for the specific purpose of AuttN
replies(1): >>kube-s+1d
◧◩
21. closep+Ic[view] [source] [discussion] 2020-04-14 17:19:35
>>Saaste+05
What about OpenID Connect? That seems a lot simpler, and also has open source implementations that aren't too intimidating.
replies(1): >>tptace+Tk
◧◩◪◨
22. kube-s+1d[view] [source] [discussion] 2020-04-14 17:21:11
>>thinkh+Hb
I know, I just personally find it to be a fragmented and confusing set of standards. And a lot of people say OAuth when they mean OpenID Connect, which doesn't help with the confusion... or they abbreviate OpenID Connect as "OpenID" which also means something else.

I've never had to clarify what someone is actually trying to accomplish when they want "SAML 2.0"

replies(1): >>tptace+5f
◧◩◪◨
23. m01+od[view] [source] [discussion] 2020-04-14 17:22:49
>>tiffan+u7
With GitHub (cloud version) specifically it doesn't (currently) work that way, you still need a "normal" GitHub username and password, and you do the organisational SAML login in regular intervals when trying to access that org's resources. I'm not aware of this being a widespread way of doing SAML, but I guess it supports certain use-cases (like keeping a GitHub identity despite switching jobs/OSS projects).

sources:

* https://help.github.com/en/github/setting-up-and-managing-or...

* https://help.github.com/en/github/authenticating-to-github/a...

[edit: formatting]

◧◩◪
24. Saaste+ud[view] [source] [discussion] 2020-04-14 17:23:19
>>cactus+Ja
Passwords, rate limits, resets, etc. are the same for everyone, and so are the problems and the solutions to those.

SAML on the other hand is different for each organization. Providers pay Auth0 and the like to have developers on staff who know the pitfalls and quirks of ADFS 3.0 on Windows Server 2012 R2, so they don't have to. Dealing with a single Okta as IdP integration is like the absolute best-case scenario there is. There is also zero consistency in what actual data IdPs returns out of the box to the SPs, so now you're walking the customer's admin through setting up the proper attribute mappings, etc.

I also very much disagree that SAML is a net security benefit, at least directly. It's for convenience, top-down visibility and control into what people are using, de-provisioning services, onboarding and offboarding users at scale etc. e.g. problems that only big companies have. Many SAML implementations are just as likely to add truck-sized security holes to the service provider when done poorly, and a lot of them are done poorly.

replies(1): >>tptace+yk
◧◩◪◨⬒
25. tptace+5f[view] [source] [discussion] 2020-04-14 17:29:30
>>kube-s+1d
You said "OAuth only does authz and must be combined with other technologies to get authn"; obviously, that's not true, in the sense that you can simply use OIDC --- a dialect of OAuth --- to get both.

Since OIDC is better than SAML, which is probably the scariest security standard on the Internet, I think it's worth being clear to people that OIDC/OAuth is viable.

The SAML authz story, for what it's worth, is pretty shady.

replies(1): >>kube-s+xh
26. tptace+tf[view] [source] 2020-04-14 17:31:08
>>thramp+(OP)
Since they just said they were waiting for Enterprise revenue to reach a level where they could free the core product, and since SAML is an important driver of Enterprise upgrades (I've seen it happen), I wouldn't hold your breath.

Now that the core Pro features are free, I wonder if Rob will update sso.tax to set Github to :inf:.

replies(1): >>thramp+Du
◧◩◪
27. Saaste+Gf[view] [source] [discussion] 2020-04-14 17:32:31
>>derefr+U9
I agree. There's a million SAML for Java/Python/Node.js/Foo libraries out there, all with a long list of issues and known cases that don't work correctly, security issues etc. but it's the wrong model in my opinion.

Instead of directly bolting SAML into your app, I think a FOSS implementation of an independently running service is the way to go. You run the battle tested open source service (locally / in your cloud), it accepts the SAML assertions and mints something sane like JWTs which can easily be consumed by the service providers, isolating the entire thing from your core app and allowing it be used with any stack. E.g. essentially an open source locally deployed Okta. Doesn't even need to do any user management, just focus on rock solid interoperability and forward all decision making to the actual app server.

replies(5): >>chrisw+2j >>snuxol+Rw >>vetina+xy >>user59+WI >>hunter+2J1
◧◩
28. tptace+eg[view] [source] [discussion] 2020-04-14 17:34:39
>>tobinf+q5
SAML is the de facto standard single sign-on protocol for enterprise-grade applications. If a SAAS app integrates directly with Okta or OneLogin, it probably does so with SAML.

There's a lot of functional overlap between SAML and OIDC/OAuth, but SAML is a very different (and idiosyncratic) protocol; the "what" is the same, but the "how" is very different.

◧◩◪
29. tptace+ug[view] [source] [discussion] 2020-04-14 17:35:37
>>hirako+J4
SSO is a security feature, not a convenience. It happens to be a security feature that comes bundled with some extra convenience, but it's not the only one like that; so are password managers.
◧◩◪◨⬒⬓
30. kube-s+xh[view] [source] [discussion] 2020-04-14 17:41:44
>>tptace+5f
For sure. I never said SAML was any good -- I said I found it to be simpler. :)
replies(1): >>tptace+li
◧◩◪◨⬒⬓⬔
31. tptace+li[view] [source] [discussion] 2020-04-14 17:45:30
>>kube-s+xh
For developers, they're both just libraries. As protocols to implement, SAML is drastically harder.
◧◩◪◨
32. chrisw+2j[view] [source] [discussion] 2020-04-14 17:48:30
>>Saaste+Gf
+1 Wish I had more upvotes to give. This should exist.
◧◩◪◨
33. tptace+yk[view] [source] [discussion] 2020-04-14 17:53:56
>>Saaste+ud
It's a little odd to say something is not a "net security benefit" and, in the next sentence, make a powerful case for it as a net security benefit. SSO is probably the most important organization security tool there is, and a survey of tech company CSOs will average it in the top 3, if not the top 2 technology acquisitions most would make at a new firm (this is a question I've actually surveyed).
replies(2): >>Saaste+po >>user59+FJ
◧◩◪
34. tptace+Tk[view] [source] [discussion] 2020-04-14 17:55:22
>>closep+Ic
It's not a technology problem. Integration with "foreign" SSOs is complicated no matter what protocol you use, with lots of corner cases and support costs, but these features are expensive for the same reason that single-day-turnaround short-notice flights between Chicago and NYC tend to be expensive: the people who want them have money to spend on them, and it isn't their money. That money pays for the cheap seats everyone else sits in.
replies(1): >>user59+uO
◧◩
35. cactus+Vl[view] [source] [discussion] 2020-04-14 17:59:35
>>tobinf+q5
SAML is pretty simple, it just uses XML which I think turns people off to it by default. I've implemented it once and I feel like I have a decent handle on what it is (though maybe I've just avoided the worst edge cases).

OAuth is way more complex, I've used it countless times and still get confused by it. It has more complex patterns like having a separate resource server and authentication server, it's used for more purposes, e.g. sometimes for API access and sometimes for login and sometimes a confusing mix of both, and there are big differences between v1 and v2 and some services are still using v1.

replies(1): >>recurs+Xz
◧◩◪◨⬒
36. Saaste+po[view] [source] [discussion] 2020-04-14 18:10:48
>>tptace+yk
SSO is a great benefit to the customers, with real tangible security and management benefits.

I'm however speaking from the point of view of the service provider (the SaaS app) and about SAML in particular. I feel that the addition of SAML into a given service is a net-negative from that service's security point of view. It's a large additional complex attack surface, many open source SAML libraries that I've reviewed have a history (and in some cases open issues right now) of "pants on head" type of security errors. A popular library in use right now, has a known race condition where it gets confused if there are concurrent SAML requests happening.

And that's just the libraries. Then you have to use them correctly. The libraries do the absolute minimum checking since they don't have the context, you have to add a laundry list of your own checks to them. Just recently there was a HN article about taking SAML assertions posted to provider A and re-using them on provider B, where clearly the most basic of checks aren't in place at all. There's all kinds of confused-deputy type of problems I believe most service providers don't think about at all. And that was an easily offline checked attribute, I believe if you'd start to check how many services correctly implement even the basic "inResponseTo" check on SP-initiated flows (which requires a distributed cache on the service provider side), you'd find they don't.

replies(1): >>tptace+Wt
◧◩◪◨⬒⬓
37. tptace+Wt[view] [source] [discussion] 2020-04-14 18:36:50
>>Saaste+po
I'm a security researcher with a minor focus in SSO libraries, working on OIDC and SAML right now. I've discovered and reported some of the kinds of issues you're referring to. Both OIDC and SAML are fraught in implementation, but so are all login features.

Meanwhile: we're discussing Github, not a random cat-sharing startup. Github has one of the larger security teams in the industry. The parties implicated in Github SAML are Github, Okta, and Github customers, who do not actually have to implement SAML. Github SAML is not in fact a net-negative for security.

replies(1): >>Saaste+fB
◧◩
38. thramp+Du[view] [source] [discussion] 2020-04-14 18:40:26
>>tptace+tf
I was _just_ thinking of https://latacora.micro.blog/2020/03/12/the-soc-starting.html and https://sso.tax/ as I was writing my comment!
◧◩◪
39. vetina+fv[view] [source] [discussion] 2020-04-14 18:42:39
>>cactus+Ja
> The problem is that the only organizations that would make this single issue of SSO support a deal-breaker are bigger companies who can afford to be upsold

That's not true. We are a tiny company (~10 ppl), but SAML, OIDC (or GSSAPI or Radius, if really necessary) support are a deal-breaker for anything we use.

We used to have separate accounts for everything we had. It became a drag, we had to solve it. Nowadays, either it can be integrated with SSO, or we will do without.

> so everyone treats this as an up-sell feature.

And that's the mistake.

◧◩◪◨
40. snuxol+Rw[view] [source] [discussion] 2020-04-14 18:50:10
>>Saaste+Gf
Nod to Keycloak / Red Hat SSO here, it’s my goto solution for dealing with identity these days.
◧◩◪◨
41. vetina+xy[view] [source] [discussion] 2020-04-14 18:58:33
>>Saaste+Gf
> it accepts the SAML assertions and mints something sane like JWTs which can easily be consumed by the service providers, isolating the entire thing from your core app and allowing it be used with any stack. E.g. essentially an open source locally deployed Okta

You want Keycloak - https://www.keycloak.org/ - then.

replies(1): >>tasssk+HD
◧◩◪
42. recurs+Xz[view] [source] [discussion] 2020-04-14 19:05:07
>>cactus+Vl
> SAML is pretty simple, it just uses XML which I think turns people off to it by default. I've implemented it once and I feel like I have a decent handle on what it is (though maybe I've just avoided the worst edge cases).

I once tried to implement it, and found that the specification was spread across ~500 pages of dense PDFs. I find it to be complex.

replies(1): >>cactus+cn3
◧◩◪
43. eastba+MA[view] [source] [discussion] 2020-04-14 19:09:37
>>harha+D5
As a business customer of a SaaS product, being able to revoke any employee's access to the SaaS tool if they are terminated. (Imagine how hard this would be for e.g. the SaaS tool your company uses to view financial reporting if it required every user at your company to create their own username/password. If you wanted to prevent someone from "going rogue" during termination, you would need to have an admin remove their account access prior to termination -- and do it on every SaaS product that person used. With SSO you revoke their access and everything gets locked out.

Source: Watching an alcoholic CTO get fired by the board and taking the startup's hosted Mongo database hostage

replies(1): >>jfkebw+T31
◧◩◪◨⬒⬓⬔
44. Saaste+fB[view] [source] [discussion] 2020-04-14 19:11:32
>>tptace+Wt
100% agreed, GitHub SAML is unequivocally good. I'm in the "cat sharing startup", so my view and comments are colored by that perspective. Our options are to pay $$$ for a competent auth provider, or take on a much larger and complex security responsibility than it would seem at first, that might end up compromising our entire service.

I have a theory that one reason we don't see many your-SAML-implementation-is-completely-broken reports is precisely because it's a gated enterprise feature, so few independent security researchers have the access or ability to poke and prod at them outside of private penetration tests.

replies(1): >>tptace+TC
◧◩◪◨⬒⬓⬔⧯
45. tptace+TC[view] [source] [discussion] 2020-04-14 19:19:19
>>Saaste+fB
The riskiest components in SSO deployments are SP-side libraries, and those are all open source. If you want to use Okta to drive those libraries, the trial account you need is free.

The worst bugs here are indeed mostly private, but that's because they're feature bugs inside of people's random products; they're like every other bug in that regard. But people do find and report bugs in the SP libraries.

I agree that SAML is risky to implement; since we agree that Github SAML is an unalloyed good thing, we'd be searching for reasons to disagree at this point.

replies(1): >>user59+0M
◧◩◪◨⬒
46. tasssk+HD[view] [source] [discussion] 2020-04-14 19:24:13
>>vetina+xy
+1 for keycloak
◧◩◪◨
47. user59+WI[view] [source] [discussion] 2020-04-14 19:53:09
>>Saaste+Gf
If you want JWT tokens, you should be using OpenID Connect instead of SAML. There is very little reasons to use SAML in 2020, it's over complicated and has little support. OpenID Connect does 95% of the same, much better.

If you want self hosted IAM solutions. The most common one is Microsoft active directory. It provides both SAML and OpenID Connect integrations out of the box as of ADFS 2016.

Still, SAML requires to onboard applications individually, create keys, and stuff. It's not plug and play, it really needs humans on both sides to add a new service.

replies(1): >>Saaste+vQ
◧◩◪◨⬒
48. user59+FJ[view] [source] [discussion] 2020-04-14 19:58:36
>>tptace+yk
What's are the other contenders for top 3?
replies(1): >>tptace+FP
◧◩
49. Haegin+QJ[view] [source] [discussion] 2020-04-14 19:58:58
>>Saaste+05
It's a paid service, but AWS Cognito supports SAML in a similar way to Okta/Auth0 but with a much lower initial cost (you just pay a reasonable rate for what you use, not multiple thousands of dollars to get it up and running). I used it to build a SAML integration at the end of last year and have been pretty happy with it so far.
replies(1): >>Saaste+LO
◧◩◪◨⬒⬓⬔⧯▣
50. user59+0M[view] [source] [discussion] 2020-04-14 20:09:45
>>tptace+TC
I'm surprised you'd say SP-side libraries are open source. In my experience, it's always been mostly custom and close source in every company I've seen and done.

You take some open source pieces you can (saml, xml, oidc, ssl, jwt) but permissions, groups, user attributes, keys are always per company then the whole thing together has to be supported into end-user applications running on language and frameworks of the day with their own restrictions, so custom.

replies(1): >>tptace+EP
◧◩◪◨
51. user59+uO[view] [source] [discussion] 2020-04-14 20:23:12
>>tptace+Tk
SAML is a technology problem, on top of all other problems.

The messages are under specified and overcomplicated, doing incredibly obscure stuff (XML signing and canonization for one) that nobody can understand and implement. That's mainly why it's so hard to use and there is so little support from libraries.

As security researcher, we could nitpick all days on security being hard, no matter the solution. It is factually true but it doesn't help developers, fact is, developers would be better off ignoring SAML and going with OIDC instead.

replies(1): >>tptace+aQ
◧◩◪
52. Saaste+LO[view] [source] [discussion] 2020-04-14 20:24:36
>>Haegin+QJ
I've looked at Cognito in depth, and it seems like an abandoned service. Hundreds of open issues that got rolled into the Amplify issue tracker, with little to no response. It lacks some pretty basic SAML capabilities, like IdP-initiated logins. If your customers want to put you as an icon in their Okta dashboard or whatever, can't do it. They reported that as being "on their roadmap" in 2017.

It does work for the basic use cases, so I would still consider that an better option than rolling your own for the average service provider.

◧◩◪◨⬒⬓⬔⧯▣▦
53. tptace+EP[view] [source] [discussion] 2020-04-14 20:29:35
>>user59+0M
What's the closed-source SAML library you're thinking of? Every SAML integration I've seen has been done with an open-source library.
replies(1): >>user59+0W
◧◩◪◨⬒⬓
54. tptace+FP[view] [source] [discussion] 2020-04-14 20:29:55
>>user59+FJ
MDM or endpoint tracking, and then it gets diverse.
◧◩◪◨⬒
55. tptace+aQ[view] [source] [discussion] 2020-04-14 20:33:11
>>user59+uO
1. I don't think this particular thread is a good venue to litigate SAML vs. OIDC.

2. I think the product complexity issues are, like, 95% the same whether you use OIDC or SAML.

3. I think no matter how much simplification you got from using OIDC instead of SAML, none of it is going to offset the actual reason why SSO integration is a paid feature.

4. I agree that SAML is much worse than OIDC from a protocol implementor's perspective even if I'm not so sure that it's much better from a developer's perspective, so wouldn't want to find new reasons to disagree.

replies(1): >>user59+JY
◧◩◪◨⬒
56. Saaste+vQ[view] [source] [discussion] 2020-04-14 20:35:30
>>user59+WI
Unfortunately the demand for SAML is 100% customer driven. As service providers, we don't control the other end (the customer's IdP/AD).

Even in cases where the IdP supports both SAML & OIDC, I see almost no one choosing to use OIDC (a case of the devil you know?). The only real users of OIDC in an enterprise setting I see as a service provider, is G Suite businesses.

replies(1): >>user59+gS
◧◩◪◨⬒⬓
57. user59+gS[view] [source] [discussion] 2020-04-14 20:46:55
>>Saaste+vQ
I think this is mostly driven by history. OIDC came in few years after SAML, so people are still thinking of SAML first and asking for it for enterprise integrations.

I'm pretty sure OIDC can be supported everywhere now. Okta, Oauth, PingIdentity, ForgeRock, Microsoft all support both. The last offender was Microsoft but it's included with active directory since 2016 both on premise or through Azure.

I'm working on auth for a big bank and it's definitely there, although not necessarily advertised and not everybody understand what is supported or preferred.

If a company were to only support OIDC nowadays, and maintain that OIDC is the preferred protocol when customers ask "can you do SAML?", I am willing to bet that most customers would integrate just fine either way.

◧◩◪◨⬒⬓⬔⧯▣▦▧
58. user59+0W[view] [source] [discussion] 2020-04-14 21:07:55
>>tptace+EP
I mean the company is writing it's own code for a significant part. Let's say one has to integrate SAML/OIDC into a Java app of some sort.

One can find an open source library to handle part of the SAML or XML in Java, but it doesn't take the right settings or import user attributes as needed or handle URL redirections properly. So the company has to write a ton of authentication code to make it work. It may start from an open-source library but the result is either separate code on top or an outright fork.

replies(1): >>tptace+kY
◧◩◪◨⬒⬓⬔⧯▣▦▧▨
59. tptace+kY[view] [source] [discussion] 2020-04-14 21:21:11
>>user59+0W
One will find a library to do the SAML. That library will almost certainly do the XML (most likely with xmlsec1). The library will have a call for the ACS endpoint, for the SSO login endpoint, and maybe for the SLO endpoint; it won't implement the endpoints itself, but it'll implement all the logic of the endpoint.

The company will end up writing a ton of authentication and authorization code --- it'll do that no matter what, because the application will have its own security logic, like all applications do.

(OIDC doesn't use XML. But the story is the same, with different endpoints.)

◧◩◪◨⬒⬓
60. user59+JY[view] [source] [discussion] 2020-04-14 21:23:25
>>tptace+aQ
I basically agree with the points.

Ironically, the first point makes me realize that half the work to bring in a product in an entreprise is to deploy and set it up -properly with authentication- while the other half is to get the budget and approvals to buy it. Thus it's rather relevant to the thread in an unfortunate way.

◧◩◪◨
61. jfkebw+T31[view] [source] [discussion] 2020-04-14 21:52:28
>>eastba+MA
I agree, but I think the GP was asking about use cases for a solo dev.
replies(1): >>eastba+uo1
◧◩◪◨
62. Spivak+re1[view] [source] [discussion] 2020-04-14 23:14:00
>>ryanis+39
And people keep saying that it's a security feature but that's not why large orgs pay for it. It's a "I'll pay you to not have to manually manage account access to all these different services.
◧◩◪
63. Spivak+Je1[view] [source] [discussion] 2020-04-14 23:17:00
>>nogabe+h4
Right but $5/month/service is where it starts to add up. Unless you're managing hundreds of users across a bunch of disparate services the value/cost doesn't work out in your favor.
◧◩◪◨⬒
64. eastba+uo1[view] [source] [discussion] 2020-04-15 00:49:25
>>jfkebw+T31
Good clarification! If you're a solo dev who wants to sell your side project to any company >500 people, SAML integration is tablestakes. If you're a solo dev who needs to secure your hobby project on the public internet, it's like bringing a Space Shuttle engine to a knife fight.
replies(1): >>jholma+UN1
◧◩◪
65. Corrad+ut1[view] [source] [discussion] 2020-04-15 01:32:49
>>atonse+S3
Yes, I'm pretty happy with the new pricing but my employer will probably have to go with the Enterprise plan to get access to the "Audit Log" and HIPAA compliance. :frown:
◧◩◪
66. JMTQp8+WD1[view] [source] [discussion] 2020-04-15 03:26:44
>>atonse+S3
If it's possible for GH to run a profitable business while offering SAML integration for free, I am 100% supportive of the suggestion. It's hard to say exactly how many enterprises pay specifically or exclusively for this reason, as opposed to other enterprise features, like audit trails.
◧◩◪◨
67. hunter+2J1[view] [source] [discussion] 2020-04-15 04:27:32
>>Saaste+Gf
This sounds like Shibboleth. The SP bolts onto httpd and delivers things like user attributes as server variables that apps can simply read. It even works if httpd is a reverse proxy in front of nodejs or whatever else, since you protect the app using location directives which play nice with proxypass directives.

The opposite certainly exists though, for example simplesamlphp which gets commingled into a php app codebase as you described.

◧◩◪◨⬒⬓
68. jholma+UN1[view] [source] [discussion] 2020-04-15 05:25:23
>>eastba+uo1
If I was in a knife fight, and my buddy showed up and just hit the guy I was fighting with a SSME, I would be totally impressed and also grateful.
◧◩◪◨
69. cactus+cn3[view] [source] [discussion] 2020-04-15 17:55:34
>>recurs+Xz
Well, relatively simple. If you added up the number of pages in the specs for http, html, css, ecmascript, and all the various apis that web developers use every day it would likely be hundreds of thousands, maybe millions of pages. That doesn't seem like a particularly useful metric, because you don't have to read and understand the entire spec to use a technology.
[go to top]