Integrate SAML in minutes instead of hours

SAML is Simple to Setup, Works With Most Applications

Intro to OneLogin's Open-Source SAML Toolkits

Security Assertion Markup Language (SAML) is a standard for logging users into applications based on their session in another context. This has significant advantages over logging in using a username/password: no need to type in credentials, no need to remember and renew password, no weak passwords etc.

Most companies already know the identity of users because they are logged into their Active Directory domain or intranet. It is natural to use this information to log users into other applications as well such as web-based application, and one of the more elegant ways of doing this by using SAML.

SAML is very powerful and flexible, but the specification can be quite a handful. Now OneLogin is releasing this SAML toolkit for Java applications to enable you to integrate SAML in hours instead of months. We’ve filtered the signal from the noise and come up with a simple setup that will work for most applications out there.

How SAML SSO works

SAML single sign-on works by transferring the user's identity from one place (the identity provider) to another (the service provider). This is done through an exchange of digitally signed XML documents. Consider the following scenario: A user is logged into a system, which acts as an identity provider. The user would like to log in to a remote application such as a support application or accounting application (i.e. the service provider). The following happens:

  1. The users clicks on the link to the application, either on the corporate intranet, a bookmark or similar and the application loads.
  2. The application identifies the user origin (either by application subdomain, user IP address or similar) and redirects the user back to the identity provider, asking for authentication. This is the authentication request.
  3. The user either has a session with the identity provider already, or established one by logging into the identity provider.
  4. The identity provider builds the authentication response in the form of a XML-document containing the user's username or email-address, signs it using a X.509 certificate and posts this information to the service provider.
  5. The service provider (which already knowns the identity provider and has a certificate fingerprint) retrieves the authentication response and validates it using the certificate fingerprint. The identity of the user is established


The diagram below illustrates the single sign-on flow for Service Provider-initiated SSO, i.e. when an application triggers SSO.


Identity provider-initiated SSO is very similar as it consists only of the last two steps.

A Note About Using AD-FS

OneLogin SAML toolkits work with AD-FS. In order to ensure they work properly, make sure you select SHA1 instead of SHA256 as the hashing algorithm in AD-FS.

SAML Debugger

Test your SAML code to optimize your implementation.

Start Testing Now