←back to thread

312 points campuscodi | 1 comments | | HN request time: 0.212s | source
Show context
tptacek ◴[] No.43375191[source]
SAML (more broadly XML-DSIG) is literally the worst security protocol in common use. I think you should generally be taking whatever hits you need to take to transition from it to OAuth. Certainly, I would refuse to bring a new product to market that relied on it. It's incredibly dangerous. Unless there's some breakthrough in practical formal verification, I can't imagine that this will be the last or the worst DSIG vulnerability.
replies(4): >>43375239 #>>43375862 #>>43376397 #>>43376552 #
akdor1154 ◴[] No.43376397[source]
My (possibly misunderstood to the point of misphrasing) understanding, is that SAML still has the point-of-difference that your sso provider can cancel a session. Is that right?
replies(3): >>43376637 #>>43376735 #>>43376899 #
recursive ◴[] No.43376899[source]
There's an optional feature in the spec I think. But in my very limited experience, it is never implemented or working correctly.
replies(1): >>43379009 #
1. p_ing ◴[] No.43379009[source]
Microsoft implements this in Azure/M365.