Demystifying JWT, OAuth, OIDC, and SAML: A Technical Guide

Demystifying JWT, OAuth, OIDC, and SAML: A Technical Guide

Dive into a clear technical guide explaining JWT, OAuth, OIDC, and SAML. Learn their strengths and weaknesses and use cases to choose the right approach for your next project. Stay updated with ...

Why You Should Avoid Customizing PeopleSoft To Enable Single Sign-On (SAML/ADFS)

Don’t Risk the Security of your Data with Customized SSO SAML/ADFS Integration for PeopleSoft On a recent discovery call, a Senior Software Engineer shared how they’re “ripping out” a custom-built PeopleSoft single ...
SOGo and PacketFence Impacted by SAML Implementation Vulnerabilities

SOGo and PacketFence Impacted by SAML Implementation Vulnerabilities

Part of Akamai's incident management process for vulnerabilities in third party software involves verifying potential impact in other systems using the same or similar libraries. While following that process when addressing the ...
SAML Implementation Vulnerability Impacting Some Akamai Services

SAML Implementation Vulnerability Impacting Some Akamai Services

| | Cloud Security, SAML, security
This blog post provides an overview of a vulnerability discovered in Akamai's Enterprise Application Access (EAA) product which has been patched. This vulnerability could have allowed an actor to impersonate an authorized ...
Hackers Didn’t Only Use SolarWinds to Break In, Says CISA

Hackers Didn’t Only Use SolarWinds to Break In, Says CISA

It wasn’t just the SolarWinds supply-chain hack. There were other ways that the “Russian” hackers broke into countless government agencies and private organizations ...
Security Boulevard

SAML/SSO Authentication and Conan in Nexus Repository 3.22

Introducing the release of Nexus Repository 3.22. Our product teams are excited to announce SAML/SSO authentication for Nexus Repository Pro. In addition to SAML/SSO, this release includes proxy support for Conan native ...
SAML, The p0wnage

SAML, The p0wnage

Oh, How Sweet It Is*... via the superlative Anitian Blog, and of course - writer Rick Osgood, comes this tremendous piece - titled 'Owning SAML, in which, the p0wning of SAML, and ...
Owning SAML

Owning SAML

Exploiting a SAML Implementation During a recent web application test, I discovered a bug in a Security Assertion Markup Language (SAML) implementation. This bug involved an insecure implementation of a SAML feature ...
How to Configure Google Single Sign-On Integration with SAML

How to Configure Google Single Sign-On Integration with SAML

Using Security Assertion Markup Language (SAML), a user can use their managed account credentials to sign in to enterprise cloud applications via Single Sign-On (SSO). An Identity Provider (IdP) service provides administrators ...
How to Configure Okta Single Sign-On Integration with SAML

How to Configure Okta Single Sign-On Integration with SAML

Configuring Okta Single Sign-On Integration with SAML Using Security Assertion Markup Language (SAML), a user can use their managed account credentials to sign in to enterprise cloud applications via Single Sign-On (SSO) ...