Cloud Security

Cybersecurity Attacks and Defenses in a Cloudy World

Member-only story

Attacking and Defending SAML

Teri Radichel
Cloud Security
Published in
19 min readMar 19, 2025

--

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

⚙️ Check out my series on Automating Cybersecurity Metrics. The Code.

🔒 Related Stories: Appsec | Secure Code | Data Breaches | Pentesting | Bug Bounties

💻 Free Content on Jobs in Cybersecurity | ✉️ Sign up for the Email List

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

The first step to attacking SAML based authentication is the same as it was for OAuth, OpenID Connect, and JWTs.

Generally a website is using either OpenID Connect or SAML. They both serve a similar purpose. SAML came first and OpenID connect is supposed to be the new and improved replacement.

The video below from Jump Cloud mentions that OpenID connect does not contain some features of SAML (the Authorization Decision Statement) that help with security. Perhaps that is because authorization is left to the application rather to determine based on scopes and claims vs. having the protocol control that part of the decision making. SAML can be used for authentication alone, leaving…

--

--

Cloud Security
Cloud Security

Published in Cloud Security

Cybersecurity Attacks and Defenses in a Cloudy World

Teri Radichel
Teri Radichel

Written by Teri Radichel

CEO 2nd Sight Lab | Pentesting | Research | AWS Security Hero | Masters of Infosec & Masters Software Engineering | GSE | IANS | SANS Difference Makers Award