SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsUnderstanding the context, terms, and definitions related to IDaaS and putting them into practical use.
Identity-as-a-Service (IDaaS) is a 3rd party offering of identity and access management (IAM) solutions, bundling many of the common IAM capabilities, typically designed to provide functionality such as:
Why IDaaS, well simply stated - building an IAM infrastructure requires a significant investment in development & infrastructure, so many organizations are choosing to buy versus build their IAM solution, avoiding much of the administrative overhead with an on-premise solution. Additionally, with the movement towards remote workforce and the proliferation of SaaS solutions, organizations can provide more robust access management to meet their business objectives.
In this article, the focus will be on using SAML with IDaaS, as it happens to be one of the most common single sign-on (SSO) methods for authentication and how this can be accomplished with the 3 big cloud providers (AWS, GCP, and Azure).
First, some important terms, definitions, and context to set the stage for this article:
With the general understanding of the context, important terms, and the associated definitions, let’s get practical! Beyond the formality, let’s now look at how to implement SAML based federation with the 3 major cloud providers, including:
The following videos have been generated to show the overall practical steps required to setup SAML based federation for each of the cloud providers.These videos complement the content provided in the SEC488: Cloud Security Essentials course, related to day 1 around the Identity and Access Management (IAM) material. Additionally, I’d like to take a moment to express my gratitude to the University of Colorado Anschutz Medical Campus for allowing me to leverage their non-production environments for demonstrating this capability.
[1] https://www.oasis-open.org/committees/download.php/21111/saml-glossary-2.0-os.html
[2] http://docs.oasis-open.org/security/saml/Post2.0/sstc-saml-tech-overview-2.0.html
[3] https://www.rfc-editor.org/rfc/rfc7644
[4] https://blog.postman.com/intro-to-apis-history-of-apis/
[5] https://www.oracle.com/technical-resources/articles/middleware/oracle-identity-cloud-service.html
[6] https://docs.oracle.com/en/cloud/paas/identity-cloud/rest-api/index.html
[7] https://docs.oracle.com/en/cloud/paas/identity-cloud/uaids/access-saml-metadata.html
[8] https://www.oracle.com/technical-resources/articles/middleware/oracle-identity-cloud-service.html
[9] https://docs.aws.amazon.com/singlesignon/latest/userguide/manage-your-identity-source-idp.html
[11] https://cloud.google.com/architecture/identity/best-practices-for-federating
Chris Edmundson has been employed in the information technology arena for over 25 years, working in a wide variety of roles, primarily in the public sector related to administration of K-12 public schools and at higher education institutions. He currently manages the Security Operations for the Office of Information Technology at the University of Colorado Denver | Anschutz Medical Campus. Chris is an Associate Instructor teachingSEC488: Cloud Security Essentials. Read Chris's full profile.
Chris Edmundson has been employed in the information technology arena for over 25 years, working in a wide variety of roles, primarily in the public sector related to administration of K-12 public schools and at higher education institutions.
Read more about Chris Edmundson