SAML Request and Response Cycle

1-8 Oracle Fusion Middleware Reference for Oracle Security Developer Tools NotAfter=2005-12-14T10:15:00Z saml:Conditions saml:AuthenticationStatement AuthenticationMethod=urn:oasis:names:tc:SAML:1.0:am:password AuthenticationInstant=2005-12-14T10:00:20Z saml:Subject saml:NameIdentifier NameQualifier=RelyingParty.com john.smith saml:NameIdentifier saml:SubjectConfirmation saml:ConfirmationMethod urn:oasis:names:tc:SAML:1.0:cm:artifact-01 saml:ConfirmationMethod saml:SubjectConfirmation saml:Subject saml:AuthenticationStatement saml:Assertion samlp:Response

1.4.2 SAML Requests and Responses

The authority that issues assertions is known as the issuing authority or identity provider . An issuing authority can be a third-party service provider or an individual business that is serving as an issuing authority within a private federation of businesses. SAML-compliant applications and services, which trust the issuing authority or identity provider and make use of its services, are called relying parties or service provider s.

1.4.2.1 SAML Request and Response Cycle

In a typical SAML cycle, the relying party or service provider, which needs to authenticate a specific client request, sends a SAML request to its issuing authority or identity provider. The identity provider responds with a SAML assertion, which supplies the relying party or service provider with the requested security information. For example, when a user signs into a SAML-compliant service of a relying party or identity provider, the service sends a request for authentication assertion to the issuing authority identity provider. The issuing authority returns an authentication assertion reference stating that the user was authenticated by a particular method at a specific time. The service can then pass this assertion reference to other relying partyidentity provider sites to validate the user’s credentials. When the user accesses another SAML-compliant site that requires authentication, that site uses the reference to request the authentication assertion from the issuing authority or identity provider, which states that the user has already been authenticated. At the issuing authority, an assertion layer handles request and response messages using the SAML protocol, which can bind to various communication and transport protocols HTTP, SOAP, and so on. Note that while the client always consumes assertions, the issuing authority or identity provider can act as producer and consumer since it can both create and validate assertions. This cycle is illustrated in Figure 1–1 . Introduction to Oracle Security Developer Tools 1-9 Figure 1–1 SAML Request-Response Cycle This figure shows a SAML request and response cycle, and shows a user, boxes for relying parties, and a box for the issuing authority. The user or client request first goes to the relying party, which sends a SAML request to its issuing authority. The issuing authority responds with a SAML assertion, which supplies the relying party with the requested security information. Two-way arrows denote the client communication with the relying party there can be more than one relying party, and also denote the request-response communication between the relying party and issuing authority. Finally, the box for the issuing authority separates out the assertion layer SAML from the transport layer HTTP, SOAP, and so on to show that the communication between these layers enables the issuing authority to create and validate assertions.

1.4.2.2 SAML Protocol Bindings and Profiles