Security concerns around SSO and Account Opening Flows
SAML Security Concerns: A → B → back to A SAML Security Concerns Threat Model User starts at Web App A → triggers SAML SSO to Web App B (SP)…
OAuth for Individual Users vs. Service Accounts — Q&A
OAuth vs. Service Accounts — Q&A Q. Is OAuth used for individual users or service accounts? A. OAuth is primarily used for individual users to authenticate and grant delegated access…
SSO with MFA – SaaS Service
SSO with MFA - for SaaS Services Q1: If a SaaS service supports SSO, does that automatically mean it supports MFA? Answer: No, it does not automatically mean MFA is…
Isolating Browser Sessions – In the Cloud and Locally
Browser Isolation Options for Whitelisted Site Access To isolate browsers so they only allow access to whitelisted sites, organizations can choose from several architectural options. Below are three major…
SAML-Based SSO: Source IP for IdP and SP Initiated Flows
SAML-Based SSO: Source IP for IdP and SP Initiated Flows SP-Initiated SSO Flow Summary: The user starts at the Service Provider (SP), which redirects them to the Identity Provider (IdP)…
Capturing a Second Factor Before Full Trust
Capturing a Second Factor Before Full Trust: A Smarter Onboarding Flow In most traditional account creation flows, users are granted full access right after setting up a username and password.…
Enforcing a Second Factor in Entra ID: How to Secure Users Who Never Had One
Enforcing a Second Factor in Entra ID: How to Secure Users Who Never Had One If a user isn’t using a second factor, they’re a risk. Many organizations still have…
Inbound versus Outbound SSO
🔐 Inbound SSO (Single Sign-On) Definition:Inbound SSO means users from an external identity provider (IdP) can sign into your application or service using their existing credentials. Your application becomes the…
OAuth – a primer
Understanding OAuth: Client Types, Flows, and Key Concepts OAuth is the backbone of modern API security, enabling controlled access to resources without sharing user credentials. At its core, OAuth is…
Two OAuth Flows – Public and Private
Public Flow - Through the Browser, Token returned to the browser. Implicit Grant Flow Private/Confidential Clients (Backend OAuth Flow), Client Credentials Flow Public clients use different authorization flows, like…