You are on page 1of 5

1

Running head: SECURITY ASSERTION MARKUP LANGUAGE


Security Assertion Markup Language
2
SECURITY ASSERTION MARKUP LANGUAGE
Security Assertion Markup Language

Define SAML and Purpose of SAML

Security Assertion Markup Language (SAML) refers to an open standard that enables the

identity providers to enhance authorization credentials to the service providers (Ragouzis, 2018).

In this case, it means that one can use a set of credentials when it comes to logging in to different

websites. Therefore, it becomes easy to manage one login per user as compared to managing

separating logins to various software. An example is customer relationship software.

Additionally, Security Assertion Markup Language uses Extensible Markup Language especially

when it comes to SAML transactions. This is key for communications between the service

providers and the identity provider. In short, SAML acts as the link between authentication of the

user identity and the authorization when using the service.

The purpose of SAML is to ease federation authentication that will give the user’s

authority to access it and identify the providers (Ragouzis, 2018). SAML comes in by offering a

solution that will allow the identity provider and the service providers to exist from each other

and this centralizes the user management and provides access to the software as a service

solution. Thorough SAML, the user authentications, and authorizations between the service

providers and the identity providers will be easy.

Describe and Define Provisioning

Provisioning is a common term used in an information technology context. The provision

simply refers to providing. When it comes to information technology context, provisioning

simply refers to the enterprise-wide configuration and deployment of various multiple IT system

resources. When it comes to grid computing, to provision simply means to activate a grid so that

it can be in use (Ragouzis, 2018). An example of grid components that are activated simply is a
3
SECURITY ASSERTION MARKUP LANGUAGE
server, array, and switch. When it comes to storage area networks, provisioning is a process of

assigning storage to synthesize performance. When it comes to telecommunications, provision is

regarded as offering a product or services like wiring or bandwidth.

Additionally, provisioning being a common term in the IT context, it can also refer to

various descriptions especially when it comes to telecommunications. Provisioning in a wireless

environment refers to the service activation that includes the programming of different network

databases and customer information (Feldpusch, 2020).  Furthermore, provisioning is the fourth

step of the telecommunication sequence referred to as OAM&P. an acronym that stands for

Operations, Administration, Maintenance, and Provisioning. Provisioning is also used in the

services Provisioning Markup Language and describes provisioning in a slightly different way. It

is the automation of all steps used to manage users and the system access entitlements.

Define and describe FIDM

To understand what this concept is all about, it is important to describe what Identity

Management. Identity Management deals with identifying individuals and controlling their

access to different resources within systems. This is done by simply implementing user

restrictions and rights. Furthermore, Federal Identity Management (FIDM) is simply an

arrangement that can is used in various multiple enterprises that allows the subscribers to use

similar identifications to obtain access to the networks and all the enterprises within the group

(Shim, Bhalla & Pendyala, 2015). Furthermore, FIDM describes the protocols and technologies

combined to allow the user to introduce security credentials with different domains. This

involves different servers running different operating systems.

Factors Affecting Mobile ID Management


4
SECURITY ASSERTION MARKUP LANGUAGE
A lot of organizations and IT experts continuously address the issues that come with

identity, especially in cybersecurity. Identity is now a problem in this digital world and therefore

such concerns require attention. In this case, the need for identity security practices calls for the

IT experts and the organization at large. This is mainly because of the problems that come with

mobile identity management.

One of the problems is poor or weak passwords. Passwords are key in modern identity

management. Therefore, any weakness within the passwords is a threat and a problem that is

very important especially when it comes to security (Indu, Anand & Bhaskar, 2018). Password is

the primary authentication in any enterprises and the users still use them as the gateway to the

user digital identities. This problem needs to enhance strong passwords hence being important

when it comes to security.

Another problem is weak authentication protocols. As much as passwords are the security

for the enterprises, the authentication protocols also come in as part of the passwords.

Additionally, measures need to be in place to ensure that the unauthorized users find it difficult

to access the system Feldpusch (2020), insists the need for strong authentication protocols is

vital. Strong authentication protocols require two-factor authentication like biometric

authentication and email confirmation.

Another common problem is provisioning and de-provisioning (Feldpusch,

2020). Keeping track when using identity management is a big problem hence being a challenge.

Enterprises need to make sure that every identity receives permissions needed to carry out

business at the time of provisioning. Additionally, the permissions must be removed when the

user is done with the enterprise; a process called Deprovisioning


5
SECURITY ASSERTION MARKUP LANGUAGE
References

Feldpusch, M. E. (2020). U.S. Patent Application No. 16/679,359.

Indu, I., Anand, P. R., & Bhaskar, V. (2018). Identity and access management in the cloud

environment: Mechanisms and challenges. Engineering science and technology, an

international journal, 21(4), 574-588.

Ragouzis, N. (2018). Security Assertion Markup Language (SAML) V2. 0 Technical Overview,

March 2008. OASIS standard. Disponível em:< http://docs. oasis-open.

org/security/saml/Post2. 0/sstc-saml-tech-overview-2.0. html>. Acesso em, 16.

Shim, S. S., Bhalla, G., & Pendyala, V. (2015). Federated identity

management. Computer, 38(12), 120-122.

You might also like