watermark logo

nullcon Goa 2014: O Dea Assertions Untwining the Security of the SAML protocol by Achin Kulshrestha

7 Views
admin
admin
03 Dec 2019

Single sign-on (SSO) systems have gained immense popularity and the backbone of this authentication mechanism is the Security Assertion Markup language or SAML. SAML is an XML-based open standard data format for exchanging authentication and authorization data between parties, in particular, it allows for Browser based authentication and other authorization use cases such as cross-domain single sign-on between an Identity Provider and a Service Provider. Since SAML assertions act as an identity for the subject or principal whom the Service Provider is going to honor, the veracity of these assertions is critical. The XML signature related attacks such as Signature Exclusion attacks and signature wrapping attack (XSW) had affected most of the common SAML implementations. Also, SAML attributes which go as part of the SAML request and response are used to make critical decisions cross domain, therefore it is imperative their implementation is secure and fuzz testing of these parameters is necessary. In this talk, we will deep dive into the intricacies of SAML protocol security and we will also discuss the approach to asynchronously fuzz SAML assertions to find issues in proprietary SAML implementations.

Thanks for watching this video and you can join us on various social networking sites.
Website: http://nullcon.net/website/
Facebook: http://www.facebook.com/nullcon
Twitter: http://twitter.com/nullcon

Show more

0 Comments Sort By

No comments found

Facebook Comments

Up next