SlideShare a Scribd company logo
Single-Sign-On
considerations and best
practices
Venkat Gattamaneni
Enterprise Architect
Venkat@ermlabs.com
Why are we here?
• To discuss
• Different Mechanisms for Authentication
• When to choose what protocol
• Best practice for implementations
• To help you understand
• Single Sign-On Using SAML 2.0
• API access using OAuth
• Authentication Providers
• To demonstrate
• The amazing things that can be built using our Authentication services
What is Single Sign On?
Per wikipedia..
Single sign-on (SSO) is a property of access control of multiple related,
but independent software systems. With this property a user logs in once
and gains access to all systems without being prompted to log in again at
each of them
In simple terms..
Ability for systems to establish Authentication using a mutually
agreed upon an identity mechanism
Authentication Mechanisms
Username / Password Authentication
• The out-of-the-box experience
• Salesforce hosts the authentication interface
• Flexible policies
• Mobile ready
䐟 User sends credentials to Salesforce
䐠 Salesforce authenticates user in our database and
user is granted session to Salesforce
What is SAML?
• The Standard for Federated Single Sign-On
• OASIS Standard: Commercial & Open Source support
• Authentication interface is hosted by customer
䐟 User requests a secure resource
䐠 Salesforce.com redirects to Customer IDP
䐡 Customer authenticates user
䐢 User returns to Salesforce.com with SAML and is
granted session
* If you’re logged into the Dreamforce org, you’ve used SAML!
What is Delegated Authentication?
• SOAP based protocol for “Single Login”
• Salesforce only: Minimal commercial support
• Salesforce hosts the authentication interface
䐟 User sends credentials to Salesforce
䐠 Salesforce sends credentials to Customer
䐡 Customer authenticates user and replies “true”
䐢 User is granted session to Salesforce
What is OAuth?
• An open protocol to allow secure API access in a simple,
standard method from desktop/web applications
• Standard track in IETF
• Integrates with previous authentication mechanisms
䐟 App redirects user to Salesforce
䐠 Salesforce authenticates user
䐡 Saleforce redirects user back to app
with code
䐢 App sends code to Salesforce
䐣 Salesforce issues session
䐤 App accesses API
When do I use what?
• UserId/Password
• When you just want the basics
• SAML
•
•
•
• OAuth
•
Single Sign-On for the web and applications
SAML provides the best commercial support
SAML provides re-use across other Cloud services
Building an API client or connected application (including Mobile)
• Delegated Auth
• SF Mobile CRM and older API clients with your own credentials
* Not mutually exclusive…you can mix and match
Customer Poll/ Question
If you want to use your Active Directory credentials to use
Salesforce for Outlook what mechanism would you use?
A. Username / Password
B. SAML
C. OAuth
D. Delegated Authentication
SSO in Action
How about using a Corporate Identity for Employees?
Identity Provider (IDP)
1. Generate SAML token and send
response to Salesforce
2. Validate SAML and generate
session
Service Provider (SP)
MyDomain: A sub-domain
used to access a specific SF
Organization.
Example: https://acme-
developer.my.salesforce.com
Provisioning Users
So, how we get the users in Salesforce??
 Manually…. But that doesn’t cut for large organizations
 API… But that takes code and maintenance
 Just In Time Provisioning (SAML JIT)
What about Multiple Salesforce Orgs?
Identity Provider (IDP)
Service Provider (SP)Service Provider (SP)
…and an org can even be an IDP…
Identity Provider (IDP)
Service Provider (SP) Service Provider (SP)
How about bookmarks?
Identity Provider (IDP)
1. Request Resource. Redirect to IDP
2. Send SAML Request
3. Authenticate. Send SAML Response
4. Validate SAML. Generate session
4
2
3 1
Service Provider (SP)
How about Employees use Mobile?
1. User Posts Credentials 2. User get’s session
Salesforce as an IDP for a Third Party SP
Identity Provider (IDP)
Service Provider (SP)Service Provider (SP)
What about Single Sign-On for Partners?
Identity Provider (IDP)
Partner Portal
Same as IDP Initiated SAML, but with 2 additional attributes
Send these in attribute statement: organization_id & portal_id
1. Generate SAML and send to
Salesforce
2. Validate SAML and generate
session
What about the Consumers?
Social Sign On
 Login using ‘Social’ Credentials
 Facebook and Janrain Authentication Providers
 Link Accounts
 Dyanamic Provisioning
How about using Social credentials for Salesforce
access?
1. Authenticate and Link accounts 2. Allow Salesforce access
SSO Best Practices
Best Practices
Develop troubleshooting practices for SSO failures
 SSO is in critical path since no login means no access to users
S A M L S e t t i n g
R e l a t e d I s s u e ? ( 1 )
Y E S
I s S A M L
T o k e n
V a l i d ? ( 2 )
N O
Y E S
M a k e
a p p r o p r i a t e
c h a n g e s t o S A M L
S e t t i n g s
E r r o r M e s s a g e s
l i k e :- F a i l e d : A u d i e n c e M i s m a t c h e d
- F a i l e d : R e c i p i e n t M i s m a t c h e d
- F a i l e d : C e r t i f i c a t e M i s m a t c h e d
N O
Y E S
i S S O S A M L I s s u e s T r o u b l e s h o o t i n g P r o c e s s
S A M L S S O I s s u e
i s R e p o r t e d
G a t h e r
I n f o r m a t i o n :
- U s e r I d
- E r r o r
M e s s a g e
A n y L o g i n E r r o r
M e s s a g e i n U s e r ’ s
L o g i n H i s t o r y ?
I s U s e r P r o f i l e
C o n f i g u r e d w i t h
P r o p e r F e d e r a t i o n I d ?
N O
Y E S
T y p e “ S A M L I d p
I n i t i a t e d
S S O ”
E r r o r M e s s a g e s l i k e :
- F a i l e d : I s s u e r
M i s m a t c h e d- F a i l e d : C e r t i f i c a t e
M i s m a t h e d
A D D I T I O N A L N O T E S
1 ) F o r C e r t i f i c a t e r e l a t e d i s s u e s , v e r i f y C e r t i f i c a t e t h a t i s u p l o a d e d u n d e r S A M L s e t t i n g s
2 ) A S A M L T o k e n c a n b e v a l i d a t e d u s i n g t h e S A M L T o k e n D e b u g g e r t o o l t h a t i s a c c e s s i b l e o n t h e S A M L S e t t i n g s S c r e e n
3 ) R e p l a y r e l a t e d i s s u e i s a t e m p o r a r y i s s u e a n d h a p p e n s i f m u l t i p l e S A M L r e q u e s t s f o r t h e s a m e u s e r i s m a d e
M a k e
a p p r o p r i a t e
c h a n g e s t o U s e r
P r o f i l e
V e r i f y i f i t r e s o l v e s t h e i s s u e
T a l k t o C i t i
S T S t e a m a n d
g e t t h e i r h e l p i n
r e s o l u t i o n o f t h e
i s s u e
I f n e c e s s a r y
o p e n s u p p o r t
t i c k e t w i t h S F D C
C i t
SAML Best Practices – Prevent Failures
• Make sure the IDP server is on a high available environment
• Be proactive with regards to certificate (Salesforce and client)
expirations
• Check for any time skews that may lead to inconsistent timeout/
session creation issues
• Implement custom logout, error pages to present custom
messages instead of defaults
• TEST and TEST and TEST
SAML Best Practices – Reliable & Scalable
• Use Federation Id instead of SF username as subject Id
• Identity based on login and no mapping required to know SF username
• Login post is org specific and hence no time needed by SF to resolve org instance
• Disabling users from directly logging into SF if SAML is
enabled
• Enable DA and implement a service that always return false
• Use the “My Domains” feature and redirect the user when attempting to login
directly. Also, disable flag that allows users to log into Salesforce.com directly
 Administrators should be excluded from SSO
Where do we go from here?
Learn more on developer force:
• http://wiki.developerforce.com/index.php/Single_Sign-
On_for_Desktop_and_Mobile_Applications_using_SAML_and_OAuth
• http://wiki.developerforce.com/index.php/CRC:SSO
Attend these sessions:
• Hands-on Training: Enable Single Sign-on with SAML
Thursday, September 20th: 3:00 PM - 4:00 PM
• Authentication with OAuth and Connected Apps
Thursday, September 20th: 10:30 AM - 11:30 AM
Venkat Gattamaneni
@venkilive
https://www.linkedin.com/in/venkatgattamaneni

More Related Content

What's hot (20)

Api security-testing
Api security-testingApi security-testing
Api security-testing
n|u - The Open Security Community
 
BTRisk Adli Bilişim Eğitimi Sunumu
BTRisk Adli Bilişim Eğitimi SunumuBTRisk Adli Bilişim Eğitimi Sunumu
BTRisk Adli Bilişim Eğitimi Sunumu
BTRisk Bilgi Güvenliği ve BT Yönetişim Hizmetleri
 
Single sign on - SSO
Single sign on - SSOSingle sign on - SSO
Single sign on - SSO
Ajit Dadresa
 
Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?
ForgeRock
 
Introduction to Kong API Gateway
Introduction to Kong API GatewayIntroduction to Kong API Gateway
Introduction to Kong API Gateway
Yohann Ciurlik
 
Single sign on - benefits, challenges and case study : iFour consultancy
Single sign on - benefits, challenges and case study :  iFour consultancySingle sign on - benefits, challenges and case study :  iFour consultancy
Single sign on - benefits, challenges and case study : iFour consultancy
Devam Shah
 
ID & IT 2013 - OpenID Connect Hands-on
ID & IT 2013 - OpenID Connect Hands-onID & IT 2013 - OpenID Connect Hands-on
ID & IT 2013 - OpenID Connect Hands-on
Nov Matake
 
Understanding Azure AD
Understanding Azure ADUnderstanding Azure AD
Understanding Azure AD
New Horizons Ireland
 
SAML Protocol Overview
SAML Protocol OverviewSAML Protocol Overview
SAML Protocol Overview
Mike Schwartz
 
Introduction to SAML 2.0
Introduction to SAML 2.0Introduction to SAML 2.0
Introduction to SAML 2.0
Mika Koivisto
 
Enterprise Single Sign-On - SSO
Enterprise Single Sign-On - SSOEnterprise Single Sign-On - SSO
Enterprise Single Sign-On - SSO
Oliver Mueller
 
Making Sense of APEX Security by Christoph Ruepprich
Making Sense of APEX Security by Christoph RuepprichMaking Sense of APEX Security by Christoph Ruepprich
Making Sense of APEX Security by Christoph Ruepprich
Enkitec
 
RSA SecurID Access
RSA SecurID AccessRSA SecurID Access
RSA SecurID Access
MarketingArrowECS_CZ
 
APIC/DataPower security
APIC/DataPower securityAPIC/DataPower security
APIC/DataPower security
Shiu-Fun Poon
 
An Introduction to OAuth 2
An Introduction to OAuth 2An Introduction to OAuth 2
An Introduction to OAuth 2
Aaron Parecki
 
Low level design template (1)
Low level design template (1)Low level design template (1)
Low level design template (1)
anosha jamshed
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM Maturity
Jerod Brennen
 
Azure Identity and access management
Azure   Identity and access managementAzure   Identity and access management
Azure Identity and access management
Dinusha Kumarasiri
 
REST and Microservices
REST and MicroservicesREST and Microservices
REST and Microservices
Shaun Abram
 
REST API and CRUD
REST API and CRUDREST API and CRUD
REST API and CRUD
Prem Sanil
 
Single sign on - SSO
Single sign on - SSOSingle sign on - SSO
Single sign on - SSO
Ajit Dadresa
 
Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?
ForgeRock
 
Introduction to Kong API Gateway
Introduction to Kong API GatewayIntroduction to Kong API Gateway
Introduction to Kong API Gateway
Yohann Ciurlik
 
Single sign on - benefits, challenges and case study : iFour consultancy
Single sign on - benefits, challenges and case study :  iFour consultancySingle sign on - benefits, challenges and case study :  iFour consultancy
Single sign on - benefits, challenges and case study : iFour consultancy
Devam Shah
 
ID & IT 2013 - OpenID Connect Hands-on
ID & IT 2013 - OpenID Connect Hands-onID & IT 2013 - OpenID Connect Hands-on
ID & IT 2013 - OpenID Connect Hands-on
Nov Matake
 
SAML Protocol Overview
SAML Protocol OverviewSAML Protocol Overview
SAML Protocol Overview
Mike Schwartz
 
Introduction to SAML 2.0
Introduction to SAML 2.0Introduction to SAML 2.0
Introduction to SAML 2.0
Mika Koivisto
 
Enterprise Single Sign-On - SSO
Enterprise Single Sign-On - SSOEnterprise Single Sign-On - SSO
Enterprise Single Sign-On - SSO
Oliver Mueller
 
Making Sense of APEX Security by Christoph Ruepprich
Making Sense of APEX Security by Christoph RuepprichMaking Sense of APEX Security by Christoph Ruepprich
Making Sense of APEX Security by Christoph Ruepprich
Enkitec
 
APIC/DataPower security
APIC/DataPower securityAPIC/DataPower security
APIC/DataPower security
Shiu-Fun Poon
 
An Introduction to OAuth 2
An Introduction to OAuth 2An Introduction to OAuth 2
An Introduction to OAuth 2
Aaron Parecki
 
Low level design template (1)
Low level design template (1)Low level design template (1)
Low level design template (1)
anosha jamshed
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM Maturity
Jerod Brennen
 
Azure Identity and access management
Azure   Identity and access managementAzure   Identity and access management
Azure Identity and access management
Dinusha Kumarasiri
 
REST and Microservices
REST and MicroservicesREST and Microservices
REST and Microservices
Shaun Abram
 
REST API and CRUD
REST API and CRUDREST API and CRUD
REST API and CRUD
Prem Sanil
 

Viewers also liked (17)

Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-onFast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
Craig Dickson
 
Single sign on
Single sign onSingle sign on
Single sign on
Rob Fitzgibbon
 
Single Sign On 101
Single Sign On 101Single Sign On 101
Single Sign On 101
Mike Schwartz
 
SINGLE SIGN-ON
SINGLE SIGN-ONSINGLE SIGN-ON
SINGLE SIGN-ON
Shambhavi Sahay
 
Open Source Identity Integration with OpenSSO
Open Source Identity Integration with OpenSSOOpen Source Identity Integration with OpenSSO
Open Source Identity Integration with OpenSSO
elliando dias
 
IBM Single Sign-On
IBM Single Sign-OnIBM Single Sign-On
IBM Single Sign-On
Van Staub, MBA
 
Building an SSO platform in php (Zendcon 2010)
Building an SSO platform in php (Zendcon 2010)Building an SSO platform in php (Zendcon 2010)
Building an SSO platform in php (Zendcon 2010)
Ivo Jansch
 
SSO Strategy Implementation Considerations
SSO Strategy Implementation ConsiderationsSSO Strategy Implementation Considerations
SSO Strategy Implementation Considerations
John Bauer
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
IBM Security
 
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITYIDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
ForgeRock
 
Securing Your Cloud Applications
Securing Your Cloud ApplicationsSecuring Your Cloud Applications
Securing Your Cloud Applications
IBM Security
 
CIO Executive breakfast session - box - okta
CIO Executive breakfast session - box - oktaCIO Executive breakfast session - box - okta
CIO Executive breakfast session - box - okta
IDGnederland
 
CIS13: Mobile Single Sign-On: Extending SSO Out to the Client
CIS13: Mobile Single Sign-On: Extending SSO Out to the ClientCIS13: Mobile Single Sign-On: Extending SSO Out to the Client
CIS13: Mobile Single Sign-On: Extending SSO Out to the Client
CloudIDSummit
 
Single Sign On - Case Study
Single Sign On - Case StudySingle Sign On - Case Study
Single Sign On - Case Study
Ebizon
 
Mobile SSO: Give App Users a Break from Typing Passwords
Mobile SSO: Give App Users a Break from Typing PasswordsMobile SSO: Give App Users a Break from Typing Passwords
Mobile SSO: Give App Users a Break from Typing Passwords
CA API Management
 
SSO - SIngle Sign On
SSO - SIngle Sign OnSSO - SIngle Sign On
SSO - SIngle Sign On
Tomasz Wójcik
 
Single sign-on Across Mobile Applications from RSAConference
Single sign-on Across Mobile Applications from RSAConferenceSingle sign-on Across Mobile Applications from RSAConference
Single sign-on Across Mobile Applications from RSAConference
CA API Management
 
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-onFast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
Craig Dickson
 
Open Source Identity Integration with OpenSSO
Open Source Identity Integration with OpenSSOOpen Source Identity Integration with OpenSSO
Open Source Identity Integration with OpenSSO
elliando dias
 
Building an SSO platform in php (Zendcon 2010)
Building an SSO platform in php (Zendcon 2010)Building an SSO platform in php (Zendcon 2010)
Building an SSO platform in php (Zendcon 2010)
Ivo Jansch
 
SSO Strategy Implementation Considerations
SSO Strategy Implementation ConsiderationsSSO Strategy Implementation Considerations
SSO Strategy Implementation Considerations
John Bauer
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
IBM Security
 
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITYIDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
ForgeRock
 
Securing Your Cloud Applications
Securing Your Cloud ApplicationsSecuring Your Cloud Applications
Securing Your Cloud Applications
IBM Security
 
CIO Executive breakfast session - box - okta
CIO Executive breakfast session - box - oktaCIO Executive breakfast session - box - okta
CIO Executive breakfast session - box - okta
IDGnederland
 
CIS13: Mobile Single Sign-On: Extending SSO Out to the Client
CIS13: Mobile Single Sign-On: Extending SSO Out to the ClientCIS13: Mobile Single Sign-On: Extending SSO Out to the Client
CIS13: Mobile Single Sign-On: Extending SSO Out to the Client
CloudIDSummit
 
Single Sign On - Case Study
Single Sign On - Case StudySingle Sign On - Case Study
Single Sign On - Case Study
Ebizon
 
Mobile SSO: Give App Users a Break from Typing Passwords
Mobile SSO: Give App Users a Break from Typing PasswordsMobile SSO: Give App Users a Break from Typing Passwords
Mobile SSO: Give App Users a Break from Typing Passwords
CA API Management
 
Single sign-on Across Mobile Applications from RSAConference
Single sign-on Across Mobile Applications from RSAConferenceSingle sign-on Across Mobile Applications from RSAConference
Single sign-on Across Mobile Applications from RSAConference
CA API Management
 
Ad

Similar to Single Sign On Considerations (20)

Decoupled APIs through Microservices
Decoupled APIs through MicroservicesDecoupled APIs through Microservices
Decoupled APIs through Microservices
David Simons
 
Webinar: Customer Growth and Loyalty with the Marketing Cloud
Webinar: Customer Growth and Loyalty with the Marketing CloudWebinar: Customer Growth and Loyalty with the Marketing Cloud
Webinar: Customer Growth and Loyalty with the Marketing Cloud
Doble Group, LLC
 
Transformative Solutions: The Impact of a Certified Salesforce Development Se...
Transformative Solutions: The Impact of a Certified Salesforce Development Se...Transformative Solutions: The Impact of a Certified Salesforce Development Se...
Transformative Solutions: The Impact of a Certified Salesforce Development Se...
Daisy Kaur
 
Introduction to Software Design Sutra
Introduction to Software Design SutraIntroduction to Software Design Sutra
Introduction to Software Design Sutra
gkrishna63
 
What it Means to be a Next-Generation Managed Service Provider
What it Means to be a Next-Generation Managed Service ProviderWhat it Means to be a Next-Generation Managed Service Provider
What it Means to be a Next-Generation Managed Service Provider
Datadog
 
Can IT leaders deliver on the strategic potential of emerging IT?
Can IT leaders deliver on the strategic potential of emerging IT? Can IT leaders deliver on the strategic potential of emerging IT?
Can IT leaders deliver on the strategic potential of emerging IT?
LeadGroup
 
Africaleadersit
AfricaleadersitAfricaleadersit
Africaleadersit
LeadGroup
 
Decoupled APIs through microservices
Decoupled APIs through microservicesDecoupled APIs through microservices
Decoupled APIs through microservices
David Simons
 
100% Visibility - Jason Yee - Codemotion Amsterdam 2018
100% Visibility - Jason Yee - Codemotion Amsterdam 2018100% Visibility - Jason Yee - Codemotion Amsterdam 2018
100% Visibility - Jason Yee - Codemotion Amsterdam 2018
Codemotion
 
Preparing for CRM
Preparing for CRMPreparing for CRM
Preparing for CRM
QGate
 
Big Data Privacy Standard Requirements
Big Data Privacy Standard RequirementsBig Data Privacy Standard Requirements
Big Data Privacy Standard Requirements
Gerardus Blokdyk
 
CIO: Standard Requirements
CIO: Standard RequirementsCIO: Standard Requirements
CIO: Standard Requirements
Gerardus Blokdyk
 
Alliance 2017 - CRM Deep Dive: Workflows, Business Rules, Security, and Troub...
Alliance 2017 - CRM Deep Dive: Workflows, Business Rules, Security, and Troub...Alliance 2017 - CRM Deep Dive: Workflows, Business Rules, Security, and Troub...
Alliance 2017 - CRM Deep Dive: Workflows, Business Rules, Security, and Troub...
Sparkrock
 
Fullscreen Digital - Retail business optimization solutions
Fullscreen Digital - Retail business optimization solutionsFullscreen Digital - Retail business optimization solutions
Fullscreen Digital - Retail business optimization solutions
Fullscreen Digital
 
Recruitment Software Market by Product Type, Distribution Channel, End User 2...
Recruitment Software Market by Product Type, Distribution Channel, End User 2...Recruitment Software Market by Product Type, Distribution Channel, End User 2...
Recruitment Software Market by Product Type, Distribution Channel, End User 2...
IMARC Group
 
Wit march 2020
Wit march 2020Wit march 2020
Wit march 2020
Maria Matecna
 
Must Have Apps to Boost CRM Productivity
Must Have Apps to Boost CRM ProductivityMust Have Apps to Boost CRM Productivity
Must Have Apps to Boost CRM Productivity
Doble Group, LLC
 
Final PPT Pratik 107.pptx
Final PPT Pratik 107.pptxFinal PPT Pratik 107.pptx
Final PPT Pratik 107.pptx
VaibhavJhanwar2
 
Secure Your Salesforce Org with Two-Factor Authentication
Secure Your Salesforce Org with Two-Factor AuthenticationSecure Your Salesforce Org with Two-Factor Authentication
Secure Your Salesforce Org with Two-Factor Authentication
Salesforce Admins
 
SharePoint Saturday Redmond - Building solutions with the future in mind
SharePoint Saturday Redmond - Building solutions with the future in mindSharePoint Saturday Redmond - Building solutions with the future in mind
SharePoint Saturday Redmond - Building solutions with the future in mind
Chris Johnson
 
Decoupled APIs through Microservices
Decoupled APIs through MicroservicesDecoupled APIs through Microservices
Decoupled APIs through Microservices
David Simons
 
Webinar: Customer Growth and Loyalty with the Marketing Cloud
Webinar: Customer Growth and Loyalty with the Marketing CloudWebinar: Customer Growth and Loyalty with the Marketing Cloud
Webinar: Customer Growth and Loyalty with the Marketing Cloud
Doble Group, LLC
 
Transformative Solutions: The Impact of a Certified Salesforce Development Se...
Transformative Solutions: The Impact of a Certified Salesforce Development Se...Transformative Solutions: The Impact of a Certified Salesforce Development Se...
Transformative Solutions: The Impact of a Certified Salesforce Development Se...
Daisy Kaur
 
Introduction to Software Design Sutra
Introduction to Software Design SutraIntroduction to Software Design Sutra
Introduction to Software Design Sutra
gkrishna63
 
What it Means to be a Next-Generation Managed Service Provider
What it Means to be a Next-Generation Managed Service ProviderWhat it Means to be a Next-Generation Managed Service Provider
What it Means to be a Next-Generation Managed Service Provider
Datadog
 
Can IT leaders deliver on the strategic potential of emerging IT?
Can IT leaders deliver on the strategic potential of emerging IT? Can IT leaders deliver on the strategic potential of emerging IT?
Can IT leaders deliver on the strategic potential of emerging IT?
LeadGroup
 
Africaleadersit
AfricaleadersitAfricaleadersit
Africaleadersit
LeadGroup
 
Decoupled APIs through microservices
Decoupled APIs through microservicesDecoupled APIs through microservices
Decoupled APIs through microservices
David Simons
 
100% Visibility - Jason Yee - Codemotion Amsterdam 2018
100% Visibility - Jason Yee - Codemotion Amsterdam 2018100% Visibility - Jason Yee - Codemotion Amsterdam 2018
100% Visibility - Jason Yee - Codemotion Amsterdam 2018
Codemotion
 
Preparing for CRM
Preparing for CRMPreparing for CRM
Preparing for CRM
QGate
 
Big Data Privacy Standard Requirements
Big Data Privacy Standard RequirementsBig Data Privacy Standard Requirements
Big Data Privacy Standard Requirements
Gerardus Blokdyk
 
CIO: Standard Requirements
CIO: Standard RequirementsCIO: Standard Requirements
CIO: Standard Requirements
Gerardus Blokdyk
 
Alliance 2017 - CRM Deep Dive: Workflows, Business Rules, Security, and Troub...
Alliance 2017 - CRM Deep Dive: Workflows, Business Rules, Security, and Troub...Alliance 2017 - CRM Deep Dive: Workflows, Business Rules, Security, and Troub...
Alliance 2017 - CRM Deep Dive: Workflows, Business Rules, Security, and Troub...
Sparkrock
 
Fullscreen Digital - Retail business optimization solutions
Fullscreen Digital - Retail business optimization solutionsFullscreen Digital - Retail business optimization solutions
Fullscreen Digital - Retail business optimization solutions
Fullscreen Digital
 
Recruitment Software Market by Product Type, Distribution Channel, End User 2...
Recruitment Software Market by Product Type, Distribution Channel, End User 2...Recruitment Software Market by Product Type, Distribution Channel, End User 2...
Recruitment Software Market by Product Type, Distribution Channel, End User 2...
IMARC Group
 
Must Have Apps to Boost CRM Productivity
Must Have Apps to Boost CRM ProductivityMust Have Apps to Boost CRM Productivity
Must Have Apps to Boost CRM Productivity
Doble Group, LLC
 
Final PPT Pratik 107.pptx
Final PPT Pratik 107.pptxFinal PPT Pratik 107.pptx
Final PPT Pratik 107.pptx
VaibhavJhanwar2
 
Secure Your Salesforce Org with Two-Factor Authentication
Secure Your Salesforce Org with Two-Factor AuthenticationSecure Your Salesforce Org with Two-Factor Authentication
Secure Your Salesforce Org with Two-Factor Authentication
Salesforce Admins
 
SharePoint Saturday Redmond - Building solutions with the future in mind
SharePoint Saturday Redmond - Building solutions with the future in mindSharePoint Saturday Redmond - Building solutions with the future in mind
SharePoint Saturday Redmond - Building solutions with the future in mind
Chris Johnson
 
Ad

Recently uploaded (20)

Murdledescargadarkweb.pdfvolumen1 100 elementary
Murdledescargadarkweb.pdfvolumen1 100 elementaryMurdledescargadarkweb.pdfvolumen1 100 elementary
Murdledescargadarkweb.pdfvolumen1 100 elementary
JorgeSemperteguiMont
 
Jeremy Millul - A Talented Software Developer
Jeremy Millul - A Talented Software DeveloperJeremy Millul - A Talented Software Developer
Jeremy Millul - A Talented Software Developer
Jeremy Millul
 
cnc-drilling-dowel-inserting-machine-drillteq-d-510-english.pdf
cnc-drilling-dowel-inserting-machine-drillteq-d-510-english.pdfcnc-drilling-dowel-inserting-machine-drillteq-d-510-english.pdf
cnc-drilling-dowel-inserting-machine-drillteq-d-510-english.pdf
AmirStern2
 
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....
Jasper Oosterveld
 
6th Power Grid Model Meetup - 21 May 2025
6th Power Grid Model Meetup - 21 May 20256th Power Grid Model Meetup - 21 May 2025
6th Power Grid Model Meetup - 21 May 2025
DanBrown980551
 
Introduction to Internet of things .ppt.
Introduction to Internet of things .ppt.Introduction to Internet of things .ppt.
Introduction to Internet of things .ppt.
hok12341073
 
Boosting MySQL with Vector Search -THE VECTOR SEARCH CONFERENCE 2025 .pdf
Boosting MySQL with Vector Search -THE VECTOR SEARCH CONFERENCE 2025 .pdfBoosting MySQL with Vector Search -THE VECTOR SEARCH CONFERENCE 2025 .pdf
Boosting MySQL with Vector Search -THE VECTOR SEARCH CONFERENCE 2025 .pdf
Alkin Tezuysal
 
Mastering AI Workflows with FME - Peak of Data & AI 2025
Mastering AI Workflows with FME - Peak of Data & AI 2025Mastering AI Workflows with FME - Peak of Data & AI 2025
Mastering AI Workflows with FME - Peak of Data & AI 2025
Safe Software
 
“State-space Models vs. Transformers for Ultra-low-power Edge AI,” a Presenta...
“State-space Models vs. Transformers for Ultra-low-power Edge AI,” a Presenta...“State-space Models vs. Transformers for Ultra-low-power Edge AI,” a Presenta...
“State-space Models vs. Transformers for Ultra-low-power Edge AI,” a Presenta...
Edge AI and Vision Alliance
 
Down the Rabbit Hole – Solving 5 Training Roadblocks
Down the Rabbit Hole – Solving 5 Training RoadblocksDown the Rabbit Hole – Solving 5 Training Roadblocks
Down the Rabbit Hole – Solving 5 Training Roadblocks
Rustici Software
 
Your startup on AWS - How to architect and maintain a Lean and Mean account J...
Your startup on AWS - How to architect and maintain a Lean and Mean account J...Your startup on AWS - How to architect and maintain a Lean and Mean account J...
Your startup on AWS - How to architect and maintain a Lean and Mean account J...
angelo60207
 
“How Qualcomm Is Powering AI-driven Multimedia at the Edge,” a Presentation f...
“How Qualcomm Is Powering AI-driven Multimedia at the Edge,” a Presentation f...“How Qualcomm Is Powering AI-driven Multimedia at the Edge,” a Presentation f...
“How Qualcomm Is Powering AI-driven Multimedia at the Edge,” a Presentation f...
Edge AI and Vision Alliance
 
What is Oracle EPM A Guide to Oracle EPM Cloud Everything You Need to Know
What is Oracle EPM A Guide to Oracle EPM Cloud Everything You Need to KnowWhat is Oracle EPM A Guide to Oracle EPM Cloud Everything You Need to Know
What is Oracle EPM A Guide to Oracle EPM Cloud Everything You Need to Know
SMACT Works
 
Data Virtualization: Bringing the Power of FME to Any Application
Data Virtualization: Bringing the Power of FME to Any ApplicationData Virtualization: Bringing the Power of FME to Any Application
Data Virtualization: Bringing the Power of FME to Any Application
Safe Software
 
FCF- Getting Started in Cybersecurity 3.0
FCF- Getting Started in Cybersecurity 3.0FCF- Getting Started in Cybersecurity 3.0
FCF- Getting Started in Cybersecurity 3.0
RodrigoMori7
 
If You Use Databricks, You Definitely Need FME
If You Use Databricks, You Definitely Need FMEIf You Use Databricks, You Definitely Need FME
If You Use Databricks, You Definitely Need FME
Safe Software
 
Integration of Utility Data into 3D BIM Models Using a 3D Solids Modeling Wor...
Integration of Utility Data into 3D BIM Models Using a 3D Solids Modeling Wor...Integration of Utility Data into 3D BIM Models Using a 3D Solids Modeling Wor...
Integration of Utility Data into 3D BIM Models Using a 3D Solids Modeling Wor...
Safe Software
 
Improving Developer Productivity With DORA, SPACE, and DevEx
Improving Developer Productivity With DORA, SPACE, and DevExImproving Developer Productivity With DORA, SPACE, and DevEx
Improving Developer Productivity With DORA, SPACE, and DevEx
Justin Reock
 
DevOps in the Modern Era - Thoughtfully Critical Podcast
DevOps in the Modern Era - Thoughtfully Critical PodcastDevOps in the Modern Era - Thoughtfully Critical Podcast
DevOps in the Modern Era - Thoughtfully Critical Podcast
Chris Wahl
 
Creating an Accessible Future-How AI-powered Accessibility Testing is Shaping...
Creating an Accessible Future-How AI-powered Accessibility Testing is Shaping...Creating an Accessible Future-How AI-powered Accessibility Testing is Shaping...
Creating an Accessible Future-How AI-powered Accessibility Testing is Shaping...
Impelsys Inc.
 
Murdledescargadarkweb.pdfvolumen1 100 elementary
Murdledescargadarkweb.pdfvolumen1 100 elementaryMurdledescargadarkweb.pdfvolumen1 100 elementary
Murdledescargadarkweb.pdfvolumen1 100 elementary
JorgeSemperteguiMont
 
Jeremy Millul - A Talented Software Developer
Jeremy Millul - A Talented Software DeveloperJeremy Millul - A Talented Software Developer
Jeremy Millul - A Talented Software Developer
Jeremy Millul
 
cnc-drilling-dowel-inserting-machine-drillteq-d-510-english.pdf
cnc-drilling-dowel-inserting-machine-drillteq-d-510-english.pdfcnc-drilling-dowel-inserting-machine-drillteq-d-510-english.pdf
cnc-drilling-dowel-inserting-machine-drillteq-d-510-english.pdf
AmirStern2
 
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....
Jasper Oosterveld
 
6th Power Grid Model Meetup - 21 May 2025
6th Power Grid Model Meetup - 21 May 20256th Power Grid Model Meetup - 21 May 2025
6th Power Grid Model Meetup - 21 May 2025
DanBrown980551
 
Introduction to Internet of things .ppt.
Introduction to Internet of things .ppt.Introduction to Internet of things .ppt.
Introduction to Internet of things .ppt.
hok12341073
 
Boosting MySQL with Vector Search -THE VECTOR SEARCH CONFERENCE 2025 .pdf
Boosting MySQL with Vector Search -THE VECTOR SEARCH CONFERENCE 2025 .pdfBoosting MySQL with Vector Search -THE VECTOR SEARCH CONFERENCE 2025 .pdf
Boosting MySQL with Vector Search -THE VECTOR SEARCH CONFERENCE 2025 .pdf
Alkin Tezuysal
 
Mastering AI Workflows with FME - Peak of Data & AI 2025
Mastering AI Workflows with FME - Peak of Data & AI 2025Mastering AI Workflows with FME - Peak of Data & AI 2025
Mastering AI Workflows with FME - Peak of Data & AI 2025
Safe Software
 
“State-space Models vs. Transformers for Ultra-low-power Edge AI,” a Presenta...
“State-space Models vs. Transformers for Ultra-low-power Edge AI,” a Presenta...“State-space Models vs. Transformers for Ultra-low-power Edge AI,” a Presenta...
“State-space Models vs. Transformers for Ultra-low-power Edge AI,” a Presenta...
Edge AI and Vision Alliance
 
Down the Rabbit Hole – Solving 5 Training Roadblocks
Down the Rabbit Hole – Solving 5 Training RoadblocksDown the Rabbit Hole – Solving 5 Training Roadblocks
Down the Rabbit Hole – Solving 5 Training Roadblocks
Rustici Software
 
Your startup on AWS - How to architect and maintain a Lean and Mean account J...
Your startup on AWS - How to architect and maintain a Lean and Mean account J...Your startup on AWS - How to architect and maintain a Lean and Mean account J...
Your startup on AWS - How to architect and maintain a Lean and Mean account J...
angelo60207
 
“How Qualcomm Is Powering AI-driven Multimedia at the Edge,” a Presentation f...
“How Qualcomm Is Powering AI-driven Multimedia at the Edge,” a Presentation f...“How Qualcomm Is Powering AI-driven Multimedia at the Edge,” a Presentation f...
“How Qualcomm Is Powering AI-driven Multimedia at the Edge,” a Presentation f...
Edge AI and Vision Alliance
 
What is Oracle EPM A Guide to Oracle EPM Cloud Everything You Need to Know
What is Oracle EPM A Guide to Oracle EPM Cloud Everything You Need to KnowWhat is Oracle EPM A Guide to Oracle EPM Cloud Everything You Need to Know
What is Oracle EPM A Guide to Oracle EPM Cloud Everything You Need to Know
SMACT Works
 
Data Virtualization: Bringing the Power of FME to Any Application
Data Virtualization: Bringing the Power of FME to Any ApplicationData Virtualization: Bringing the Power of FME to Any Application
Data Virtualization: Bringing the Power of FME to Any Application
Safe Software
 
FCF- Getting Started in Cybersecurity 3.0
FCF- Getting Started in Cybersecurity 3.0FCF- Getting Started in Cybersecurity 3.0
FCF- Getting Started in Cybersecurity 3.0
RodrigoMori7
 
If You Use Databricks, You Definitely Need FME
If You Use Databricks, You Definitely Need FMEIf You Use Databricks, You Definitely Need FME
If You Use Databricks, You Definitely Need FME
Safe Software
 
Integration of Utility Data into 3D BIM Models Using a 3D Solids Modeling Wor...
Integration of Utility Data into 3D BIM Models Using a 3D Solids Modeling Wor...Integration of Utility Data into 3D BIM Models Using a 3D Solids Modeling Wor...
Integration of Utility Data into 3D BIM Models Using a 3D Solids Modeling Wor...
Safe Software
 
Improving Developer Productivity With DORA, SPACE, and DevEx
Improving Developer Productivity With DORA, SPACE, and DevExImproving Developer Productivity With DORA, SPACE, and DevEx
Improving Developer Productivity With DORA, SPACE, and DevEx
Justin Reock
 
DevOps in the Modern Era - Thoughtfully Critical Podcast
DevOps in the Modern Era - Thoughtfully Critical PodcastDevOps in the Modern Era - Thoughtfully Critical Podcast
DevOps in the Modern Era - Thoughtfully Critical Podcast
Chris Wahl
 
Creating an Accessible Future-How AI-powered Accessibility Testing is Shaping...
Creating an Accessible Future-How AI-powered Accessibility Testing is Shaping...Creating an Accessible Future-How AI-powered Accessibility Testing is Shaping...
Creating an Accessible Future-How AI-powered Accessibility Testing is Shaping...
Impelsys Inc.
 

Single Sign On Considerations

  • 2. Why are we here? • To discuss • Different Mechanisms for Authentication • When to choose what protocol • Best practice for implementations • To help you understand • Single Sign-On Using SAML 2.0 • API access using OAuth • Authentication Providers • To demonstrate • The amazing things that can be built using our Authentication services
  • 3. What is Single Sign On? Per wikipedia.. Single sign-on (SSO) is a property of access control of multiple related, but independent software systems. With this property a user logs in once and gains access to all systems without being prompted to log in again at each of them In simple terms.. Ability for systems to establish Authentication using a mutually agreed upon an identity mechanism
  • 5. Username / Password Authentication • The out-of-the-box experience • Salesforce hosts the authentication interface • Flexible policies • Mobile ready 䐟 User sends credentials to Salesforce 䐠 Salesforce authenticates user in our database and user is granted session to Salesforce
  • 6. What is SAML? • The Standard for Federated Single Sign-On • OASIS Standard: Commercial & Open Source support • Authentication interface is hosted by customer 䐟 User requests a secure resource 䐠 Salesforce.com redirects to Customer IDP 䐡 Customer authenticates user 䐢 User returns to Salesforce.com with SAML and is granted session * If you’re logged into the Dreamforce org, you’ve used SAML!
  • 7. What is Delegated Authentication? • SOAP based protocol for “Single Login” • Salesforce only: Minimal commercial support • Salesforce hosts the authentication interface 䐟 User sends credentials to Salesforce 䐠 Salesforce sends credentials to Customer 䐡 Customer authenticates user and replies “true” 䐢 User is granted session to Salesforce
  • 8. What is OAuth? • An open protocol to allow secure API access in a simple, standard method from desktop/web applications • Standard track in IETF • Integrates with previous authentication mechanisms 䐟 App redirects user to Salesforce 䐠 Salesforce authenticates user 䐡 Saleforce redirects user back to app with code 䐢 App sends code to Salesforce 䐣 Salesforce issues session 䐤 App accesses API
  • 9. When do I use what? • UserId/Password • When you just want the basics • SAML • • • • OAuth • Single Sign-On for the web and applications SAML provides the best commercial support SAML provides re-use across other Cloud services Building an API client or connected application (including Mobile) • Delegated Auth • SF Mobile CRM and older API clients with your own credentials * Not mutually exclusive…you can mix and match
  • 10. Customer Poll/ Question If you want to use your Active Directory credentials to use Salesforce for Outlook what mechanism would you use? A. Username / Password B. SAML C. OAuth D. Delegated Authentication
  • 12. How about using a Corporate Identity for Employees? Identity Provider (IDP) 1. Generate SAML token and send response to Salesforce 2. Validate SAML and generate session Service Provider (SP) MyDomain: A sub-domain used to access a specific SF Organization. Example: https://acme- developer.my.salesforce.com
  • 13. Provisioning Users So, how we get the users in Salesforce??  Manually…. But that doesn’t cut for large organizations  API… But that takes code and maintenance  Just In Time Provisioning (SAML JIT)
  • 14. What about Multiple Salesforce Orgs? Identity Provider (IDP) Service Provider (SP)Service Provider (SP)
  • 15. …and an org can even be an IDP… Identity Provider (IDP) Service Provider (SP) Service Provider (SP)
  • 16. How about bookmarks? Identity Provider (IDP) 1. Request Resource. Redirect to IDP 2. Send SAML Request 3. Authenticate. Send SAML Response 4. Validate SAML. Generate session 4 2 3 1 Service Provider (SP)
  • 17. How about Employees use Mobile? 1. User Posts Credentials 2. User get’s session
  • 18. Salesforce as an IDP for a Third Party SP Identity Provider (IDP) Service Provider (SP)Service Provider (SP)
  • 19. What about Single Sign-On for Partners? Identity Provider (IDP) Partner Portal Same as IDP Initiated SAML, but with 2 additional attributes Send these in attribute statement: organization_id & portal_id 1. Generate SAML and send to Salesforce 2. Validate SAML and generate session
  • 20. What about the Consumers? Social Sign On  Login using ‘Social’ Credentials  Facebook and Janrain Authentication Providers  Link Accounts  Dyanamic Provisioning
  • 21. How about using Social credentials for Salesforce access? 1. Authenticate and Link accounts 2. Allow Salesforce access
  • 23. Best Practices Develop troubleshooting practices for SSO failures  SSO is in critical path since no login means no access to users S A M L S e t t i n g R e l a t e d I s s u e ? ( 1 ) Y E S I s S A M L T o k e n V a l i d ? ( 2 ) N O Y E S M a k e a p p r o p r i a t e c h a n g e s t o S A M L S e t t i n g s E r r o r M e s s a g e s l i k e :- F a i l e d : A u d i e n c e M i s m a t c h e d - F a i l e d : R e c i p i e n t M i s m a t c h e d - F a i l e d : C e r t i f i c a t e M i s m a t c h e d N O Y E S i S S O S A M L I s s u e s T r o u b l e s h o o t i n g P r o c e s s S A M L S S O I s s u e i s R e p o r t e d G a t h e r I n f o r m a t i o n : - U s e r I d - E r r o r M e s s a g e A n y L o g i n E r r o r M e s s a g e i n U s e r ’ s L o g i n H i s t o r y ? I s U s e r P r o f i l e C o n f i g u r e d w i t h P r o p e r F e d e r a t i o n I d ? N O Y E S T y p e “ S A M L I d p I n i t i a t e d S S O ” E r r o r M e s s a g e s l i k e : - F a i l e d : I s s u e r M i s m a t c h e d- F a i l e d : C e r t i f i c a t e M i s m a t h e d A D D I T I O N A L N O T E S 1 ) F o r C e r t i f i c a t e r e l a t e d i s s u e s , v e r i f y C e r t i f i c a t e t h a t i s u p l o a d e d u n d e r S A M L s e t t i n g s 2 ) A S A M L T o k e n c a n b e v a l i d a t e d u s i n g t h e S A M L T o k e n D e b u g g e r t o o l t h a t i s a c c e s s i b l e o n t h e S A M L S e t t i n g s S c r e e n 3 ) R e p l a y r e l a t e d i s s u e i s a t e m p o r a r y i s s u e a n d h a p p e n s i f m u l t i p l e S A M L r e q u e s t s f o r t h e s a m e u s e r i s m a d e M a k e a p p r o p r i a t e c h a n g e s t o U s e r P r o f i l e V e r i f y i f i t r e s o l v e s t h e i s s u e T a l k t o C i t i S T S t e a m a n d g e t t h e i r h e l p i n r e s o l u t i o n o f t h e i s s u e I f n e c e s s a r y o p e n s u p p o r t t i c k e t w i t h S F D C C i t
  • 24. SAML Best Practices – Prevent Failures • Make sure the IDP server is on a high available environment • Be proactive with regards to certificate (Salesforce and client) expirations • Check for any time skews that may lead to inconsistent timeout/ session creation issues • Implement custom logout, error pages to present custom messages instead of defaults • TEST and TEST and TEST
  • 25. SAML Best Practices – Reliable & Scalable • Use Federation Id instead of SF username as subject Id • Identity based on login and no mapping required to know SF username • Login post is org specific and hence no time needed by SF to resolve org instance • Disabling users from directly logging into SF if SAML is enabled • Enable DA and implement a service that always return false • Use the “My Domains” feature and redirect the user when attempting to login directly. Also, disable flag that allows users to log into Salesforce.com directly  Administrators should be excluded from SSO
  • 26. Where do we go from here? Learn more on developer force: • http://wiki.developerforce.com/index.php/Single_Sign- On_for_Desktop_and_Mobile_Applications_using_SAML_and_OAuth • http://wiki.developerforce.com/index.php/CRC:SSO Attend these sessions: • Hands-on Training: Enable Single Sign-on with SAML Thursday, September 20th: 3:00 PM - 4:00 PM • Authentication with OAuth and Connected Apps Thursday, September 20th: 10:30 AM - 11:30 AM