SAML Single Sign-On is very much user friendly as it helps in avoiding signing again and again for using multiple web applications with it's effective security mechanism.It is very helpful for preventing risk of password related security breaches. Review collected by and hosted on G2.com.
SAML SSO is not compatible with all applications, and moreover it is very complex and require much expertise to implement it. Review collected by and hosted on G2.com.
It enables us to have seamless integration of apps and users without having the need to manually enter credentials. Review collected by and hosted on G2.com.
As such there are no dislikes in the normal use, i.e., happy cases. Only thing is it has to be securely handled once the use case is over otherwise it can enable others using the same device to access using your credentials. Review collected by and hosted on G2.com.
I liked the way SAML is designed and I don't have to enter and remember my password for every other website. I just have to remember it for one and we are good to go. Review collected by and hosted on G2.com.
I would say I don't have any issues as such. I guess the only thing it was missing was two-way auth and I guess in the latest releases that issue is also solved. Review collected by and hosted on G2.com.
The SAML protocol is not meant to be complex but should be implemented by an expert. When used properly it gives a centralized method for securing your authentication which can save time and money. When done properly it not only secures your authentication, but has a positive effect on your users because they are either not prompted for authentication as much, with many different passwords, or are prompted in the same way, making it streamlined for education. Review collected by and hosted on G2.com.
SAML is complex. But something like this should and must be. But because of this I caution teams without the right amount of experience to implement this. If done incorrectly you can end up making not just one of your applications less secure, but many, or all of them because you centralized it, but didn't understand that you made your methods less secure. Review collected by and hosted on G2.com.
Fast and user friendly with good features according to the trend and I love it because for me it's appropriate and easy Review collected by and hosted on G2.com.
None as I don't see a single feature that frustrates or makes me to avoid it therefor I wish to use it as I like it a lot Review collected by and hosted on G2.com.
Implementing SAML SSO from scratch is a real pain. I've used SAML SSO by resolution and it helped me to integrate SSO through OKTA to my apps easily without any hassle or bugs Review collected by and hosted on G2.com.
I didn't see any room for betterment in this tool. Review collected by and hosted on G2.com.
I have been using SAML protocol more than 2.5 years. Even still in my current organization using SAML protocol also.
The best part about SAML I like is, it is very easy to integrate with applications. We can customise attribute as well. Suppose we dot get any requirement to add custom scope or extra attribute in the specific application, SAML protocol allows us to map that extra attribute under extended properties. In a single line I would say, SAML is very customisable protocol subjected to requirement. Review collected by and hosted on G2.com.
As so far, there are very few things I dislike about SAML. Some days before we observed that two applications are sharing the same entity ID but there was a requirement to add custom scope and extra attribute for only one application. Then we got to know that when we add that extra attribute, that will be mapped to two the applications. It is not possible to make any changes just for one application if they shares same entity ID. Review collected by and hosted on G2.com.
We tried using SAML SSO for our LDAP access-group integration to control access to our Elastic Search/Kibana Dashboard. We were able to add a list of allowed/disallowed user groups to the access to the correct audience. Review collected by and hosted on G2.com.
Integration was a lot harder than ODIC, some of the key attributes were not returned properly during the call back which cause us lot of debugging Review collected by and hosted on G2.com.
It provides a way to enable users to use different features/functionalities of service providers on other subdomains without requiring users to provide their credentials multiple times. Review collected by and hosted on G2.com.
I didn't find anything which I didn't like yet. Review collected by and hosted on G2.com.
The open standard allows identity providers to pass authorization credentials to service providers. Easy to configure and easy to access. All applications and service providers are supporting SAML integration. Review collected by and hosted on G2.com.
It requires more technical information for the admin who is going to configure. Troubleshooting is a little bit difficult for the admins—knowledge of various applications is required during integration. Review collected by and hosted on G2.com.