{"id":54309,"date":"2021-09-23T13:54:00","date_gmt":"2021-09-23T17:54:00","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=54309"},"modified":"2024-01-24T12:44:42","modified_gmt":"2024-01-24T17:44:42","slug":"how-to-test-saml-and-configure-sso-for-free","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/how-to-test-saml-and-configure-sso-for-free","title":{"rendered":"How to Test SAML and Configure SSO Using a Free-to-Use Application"},"content":{"rendered":"\n

The days where employees sat at workstations and interacted exclusively with native applications are gone but not forgotten: the legacy of singular passwords for services\/apps persists, compounding frustrations for IT administrators and users alike. <\/p>\n\n\n\n

That\u2019s especially true with cloud infrastructures, where exposing credentials over the wire and the potential for a multitude of weak passwords hampers user productivity and increases risks. There\u2019s a better solution: Single Sign-On (SSO)<\/a>.<\/p>\n\n\n\n

What is Single Sign-On (SSO)?<\/h2>\n\n\n\n


SSO is a solution that many large organizations have adopted to modernize authentication and identity management, as well as achieving frictionless employee onboarding and offboarding. A single, secure password is initially used, but then things start to work very differently.<\/p>\n\n\n\n

SSO utilizes SAML<\/a>, a mechanism that shares identities between organizations and applications. SAML won\u2019t send passwords over the web for every login; it uses a system of secure tokens, instead, which reduces security risks when it\u2019s implemented correctly. Simply put, a \u2018passwordless\u2019 future with modern authentication standards like SAML and OAuth<\/a> is something that should be on your roadmap.<\/p>\n\n\n\n

You may be wondering why SSO adoption isn\u2019t universal. The answer is complicated: many small to medium-sized enterprises (SMEs) are mired in legacy directory environments that use the network protocol Kerberos to secure authentication across on-premise networks. <\/p>\n\n\n\n

It worked well in that scenario, but today\u2019s IT infrastructures aren\u2019t all local and using passwords to authenticate into every service is essentially solving one problem with another. The password-centric mindset Kerberos established has become detrimental to security, and it\u2019s complex and risky to use for cross-realm deployments (meaning if A trusts B and B trusts C, A might trust C). <\/p>\n\n\n\n

You\u2019ll also find that this complicated legacy protocol is difficult to troubleshoot, verify security guarantees, and has a potential for unconstrained delegated permissions downstream. The most pernicious results of this technical debt are: difficult password management, the risk of password reuse<\/a>, and data breaches that expose those credentials. <\/p>\n\n\n\n

All of those things increase your (unaccepted) risks, making data breaches more likely to occur. SSO is a modern, simpler way to address all of those issues, but takes some time to set up.<\/p>\n\n\n\n

Candidly, \u2018SSO is hard to test\u2019 is another common refrain. You wouldn\u2019t code a web site without viewing the product and conducting shakeout testing before entering production. Your brand, reputation, and user satisfaction would be disadvantaged, and it makes no sense to do that. The same is true for SSO, where:<\/p>\n\n\n\n