zlacker

[parent] [thread] 12 comments
1. tobinf+(OP)[view] [source] 2020-04-14 16:46:26
I'd never heard of SAML before. Is it like a more complicated version of OAuth?
replies(4): >>jaywal+j2 >>kube-s+s2 >>tptace+Oa >>cactus+vg
2. jaywal+j2[view] [source] 2020-04-14 16:57:34
>>tobinf+(OP)
Basically, yes. Give me a choice between SAML and OIDC, and I'll choose OIDC every single time.
3. kube-s+s2[view] [source] 2020-04-14 16:58:07
>>tobinf+(OP)
SAML has been around longer and handles AuthN and AuthZ

OAuth only does AuthZ. I've always found OAuth more complicated because you have to combine it with other technologies to get AuthN

replies(2): >>gknoy+n5 >>thinkh+h6
◧◩
4. gknoy+n5[view] [source] [discussion] 2020-04-14 17:11:28
>>kube-s+s2
For those like me who had never heard these abbreviations:

AuthN: Authentication (who you are) AuthZ: Authorization (what you are allowed to do)

◧◩
5. thinkh+h6[view] [source] [discussion] 2020-04-14 17:15:19
>>kube-s+s2
OpenID Connect is the standardized AuthN process built on top of OAuth. It’s “on top of” but in practice it’s a simplification if OAuth for the specific purpose of AuttN
replies(1): >>kube-s+B7
◧◩◪
6. kube-s+B7[view] [source] [discussion] 2020-04-14 17:21:11
>>thinkh+h6
I know, I just personally find it to be a fragmented and confusing set of standards. And a lot of people say OAuth when they mean OpenID Connect, which doesn't help with the confusion... or they abbreviate OpenID Connect as "OpenID" which also means something else.

I've never had to clarify what someone is actually trying to accomplish when they want "SAML 2.0"

replies(1): >>tptace+F9
◧◩◪◨
7. tptace+F9[view] [source] [discussion] 2020-04-14 17:29:30
>>kube-s+B7
You said "OAuth only does authz and must be combined with other technologies to get authn"; obviously, that's not true, in the sense that you can simply use OIDC --- a dialect of OAuth --- to get both.

Since OIDC is better than SAML, which is probably the scariest security standard on the Internet, I think it's worth being clear to people that OIDC/OAuth is viable.

The SAML authz story, for what it's worth, is pretty shady.

replies(1): >>kube-s+7c
8. tptace+Oa[view] [source] 2020-04-14 17:34:39
>>tobinf+(OP)
SAML is the de facto standard single sign-on protocol for enterprise-grade applications. If a SAAS app integrates directly with Okta or OneLogin, it probably does so with SAML.

There's a lot of functional overlap between SAML and OIDC/OAuth, but SAML is a very different (and idiosyncratic) protocol; the "what" is the same, but the "how" is very different.

◧◩◪◨⬒
9. kube-s+7c[view] [source] [discussion] 2020-04-14 17:41:44
>>tptace+F9
For sure. I never said SAML was any good -- I said I found it to be simpler. :)
replies(1): >>tptace+Vc
◧◩◪◨⬒⬓
10. tptace+Vc[view] [source] [discussion] 2020-04-14 17:45:30
>>kube-s+7c
For developers, they're both just libraries. As protocols to implement, SAML is drastically harder.
11. cactus+vg[view] [source] 2020-04-14 17:59:35
>>tobinf+(OP)
SAML is pretty simple, it just uses XML which I think turns people off to it by default. I've implemented it once and I feel like I have a decent handle on what it is (though maybe I've just avoided the worst edge cases).

OAuth is way more complex, I've used it countless times and still get confused by it. It has more complex patterns like having a separate resource server and authentication server, it's used for more purposes, e.g. sometimes for API access and sometimes for login and sometimes a confusing mix of both, and there are big differences between v1 and v2 and some services are still using v1.

replies(1): >>recurs+xu
◧◩
12. recurs+xu[view] [source] [discussion] 2020-04-14 19:05:07
>>cactus+vg
> SAML is pretty simple, it just uses XML which I think turns people off to it by default. I've implemented it once and I feel like I have a decent handle on what it is (though maybe I've just avoided the worst edge cases).

I once tried to implement it, and found that the specification was spread across ~500 pages of dense PDFs. I find it to be complex.

replies(1): >>cactus+Mh3
◧◩◪
13. cactus+Mh3[view] [source] [discussion] 2020-04-15 17:55:34
>>recurs+xu
Well, relatively simple. If you added up the number of pages in the specs for http, html, css, ecmascript, and all the various apis that web developers use every day it would likely be hundreds of thousands, maybe millions of pages. That doesn't seem like a particularly useful metric, because you don't have to read and understand the entire spec to use a technology.
[go to top]