• Download a trial
  • Sales
  • Support
  • Login
logo
  • Home
  • Products
  • Solutions
  • Partners
  • About Us
  • Consulting
  • Resources
Request a Quote
  • Workforce Identity
  • Customer Identity
  • Comparison
  • Subscriptions

All Features

Overview of all features in Workforce Identity

User Onboarding and Offboarding

Automate joiner, mover, leaver processes

Access Request

Access requests with multi-step approvals

User Access Reviews

Save time with user access reviews

Self-Service Portal

Self-service portal for all end user activities

Segregation of Duties

Detect and remediate SoD violations

Password Management

Enforce password policies and enable synchronization

Single Sign-On (SSO)

Enable SSO using standards - SAML, oAuth, OIDC

Authentication and MFA

Improve security with adaptive authentication and MFA

3rd Party IdP Integration

Integrate with your existing identity provider

Integration API

Use the REST API to add identity into your applications

Connector Library

Integrate on-premise and SaaS applications

Modern Architecture

Microservice architecture that supports deployment using RPM, Kubernetes or OpenShift

Workforce Identity Concepts

All Features

Overview of all features in Customer IAM

Authentication and MFA

Improve security with adaptive authentication and MFA 

Single Sign-On (SSO)

Enable SSO using standards - SAML, oAuth, OIDC

Password Management

Enforce password policies and enable synchronization

Modern Architecture

Microservice architecture that supports deployment using RPM, Kubernetes or OpenShift

Customer Identity Concepts

Community vs Enterprise

Summary of the differences between the Community and Enterprise editions

Subscription Benefits

Overview of the benefits provided by an OpenIAM subscription

  • Integrations
  • Verticals
  • Workforce Use Cases
  • CIAM Use Cases
  • Compliance

Active Directory

Manage identity in Active Directory

Azure (O365)

Manage identity in Office365

SAP

Manage identity in SAP S/4 Hana

SAP SuccessFactors

Manage identity in SAP SuccessFactors

Workday

Manage identity in Workday

Education

Manage identity for students, staff and alumni

User Access Requests

Empower end users and improve compliance with user access requests

Strong Authentication

Improve security with adaptive authentication and MFA

Single Sign-On (SSO)

Improve customer experience with SSO

NIS2

Achieve compliance with the EU directive for cybersecurity frameworks.

DORA

Comply with the Digital Operational Resilience Act for the EU.

HIPAA

For healthcare organizations seeking HIPAA compliance.

  • Partners

Current Partners

Our Current Partners

  • About Us

About OpenIAM

Learn about OpenIAM

Press Releases

References to OpenIAM press releases

OpenIAM in the Media

References to OpenIAM in the media

Careers

Learn about open positions at OpenIAM.

  • Consulting

Proof of Value

Customized engagement to confirm defined proof of value objectives

Jump Start

Customized engagement to rapidly deliver a solution into production

Solution Implementation

Engagement with the objective to deliver a complete IAM solution based on customer requirements

  • Resources

Videos

Collection of videos describing how OpenIAM can be used to solve common use cases

Community Portal

Collaborative community portal to learn more about OpenIAM

CE Documentation

Documentation for the Community Edition

Blog

Musings on identity penned by the OpenIAM team

Webinar Calendar

Upcoming webinars and training sessions

Workforce Identity Concepts

Customer Identity Concepts

What is SAML?

Security Assertion Markup Language (SAML) is an open standard that allows identity providers (IdP) to pass authorization credentials to service providers (SP). What makes SAML distinct is its ability to enable Single Sign-On (SSO), a feature that allows users to access multiple applications with a single set of login credentials.

SAML works by transferring the user's identity from one place (the identity provider) to another (the service provider). This is done through an exchange of digitally signed XML documents, which are considered extremely secure and help confirm the user's identity and access rights without repeatedly entering login credentials. 

The SAML process

The SAML authentication process involves three main parties: the user, the identity provider (IdP), and the service provider (SP). The interaction unfolds as follows:

  1. Initial request: A user attempts to access a service (SP). If unauthenticated, the user is redirected to the IdP with a request for authentication.
  2. Authentication: The IdP identifies the user, often prompting for credentials like a username and password. Upon successful authentication, the IdP generates a SAML assertion (XML format) representing the user’s authentication status and, if applicable, additional authorization data.
  3. Assertion transfer: The user’s browser receives this assertion and forwards it to the SP.
  4. Granting access: The SP, already configured to trust the IdP, validates the assertion. Upon successful validation, the service initiates a session for the user, granting appropriate access.

Advantages of implementing SAML

  • Security enhancement: SAML increases security by centralizing user authentication, reducing the points of attack inherent in multiple password environments. It also eliminates the need to transmit passwords between the user and the SP.
  • Reduced administrative burden: SAML streamlines user management. With SSO, the need for multiple passwords and user databases is negated, reducing IT overhead associated with password resets and account provisioning. 
  • Improved user experience: Users seamlessly navigate between different services or applications without facing constant authentication requests, fostering a more efficient and user-friendly environment. 
  • Interoperability: SAML allows for standardization across systems. Organizations can collaborate more smoothly, with users accessing various resources regardless of the underlying technology or platform.

Challenges and considerations

While SAML brings numerous benefits, its implementation comes with challenges. Understanding the technical complexities is essential and setting it up requires careful configuration and regular maintenance to accommodate changes within the digital ecosystem. Additionally, as an organization’s suite of applications grows, managing SAML integrations requires a strategic approach and potentially the support of solutions that can automate or simplify this management.

How SAML works

  1. User requests access: When a user attempts to access a certain resource, they are prompted to log in via their IdP, rather than providing credentials directly to the application.
  2. Authentication: The user logs in, providing their credentials to the IdP server. Upon successful authentication, the IdP creates a SAML assertion (a type of XML document that contains the user’s authorization data).
  3. Assertion: The user’s browser receives this assertion and forwards it to the service provider. The assertion is digitally signed by the IdP and can be verified by the service provider, ensuring it’s legitimate.
  4. Authorization: The service provider checks the SAML assertion, verifies it against its list of trusted IdPs, and grants access to the user.
  5. Single sign-on: Once the user is authenticated for one service, the same SAML assertion can be used to request access to other resources or applications without the need for the user to log in again, hence the term "Single Sign-On."

When it comes to addressing your precise security and compliance requirements in the realm of identity governance, there is no better partner to assist you. Explore how our expertise can help you leverage SAML (Security Assertion Markup Language) for secure identity authentication and data protection, regardless of data location.

Let’s Connect

Managing identity can be complex. Let OpenIAM simplify how you manage all of your identities from a converged modern platform hosted on-premises or in the cloud.

For 15 years, OpenIAM has been helping mid to large enterprises globally improve security and end user satisfaction while lowering operational costs.

Download a Trial Contact Sales
footer-top-logo
openIAM-white-logo

All modules of our IAM platform share a common infrastructure allowing customers to see one unified identity solution versus a collection of disparate products.

  • linkedin-icon
  • facebook-icon
  • twitter-icon
  • youtube-icon

sales@openiam.com

(858)935-7561

Copyright © 2025 OpenIAM. All rights reserved.
  • Privacy Policy