Technology & Tools

SAML

SAML (Security Assertion Markup Language) is an XML-based open standard for exchanging authentication and authorization data between identity providers and service providers, enabling single sign-on across applications.
Read summarized version with

What is SAML?

SAML (Security Assertion Markup Language) is an open standard that lets different systems securely share authentication and authorization information. In practical terms, it allows an identity provider (the system that confirms who you are) to hand off your login credentials to a service provider (the app you're trying to use). This XML-based protocol has become fundamental to enterprise security, especially when implementing single sign-on across a bunch of different applications.

The process involves three key players: the principal (usually you, the user), the identity provider (IdP), and the service provider (SP). Here's what happens when you try to access an app: the service provider bounces you over to the identity provider to log in. Once you've authenticated successfully, the identity provider generates a SAML assertion, which is basically a digitally signed token that says who you are and what you're allowed to do. That token goes back to the service provider, and you're in.

SAML has been around since 2005 when OASIS (Organization for the Advancement of Structured Information Standards) released version 2.0. It's still going strong in enterprise settings where organizations juggle user access across dozens of internal and external applications while keeping security tight.

Key Characteristics of SAML

  • XML-Based Protocol: SAML structures its authentication messages in XML, giving you a standardized, readable format for passing identity data between systems.
  • Identity Provider Trust: Organizations set up a trust relationship between their identity provider and various service providers. This allows credentials to be exchanged securely without ever sharing the actual passwords.
  • Assertion-Based Security: Those SAML assertions contain digitally signed statements about who the user is, whether they're authenticated, and what they're authorized to do. The digital signatures keep the data intact during transmission.
  • Built for Enterprise SSO: SAML was designed with enterprise web browser single sign-on in mind, so it works particularly well for traditional web applications.
  • Federated Identity Support: One of SAML's strengths is enabling federated identity management. Organizations can extend authentication across different security domains and even partner companies.

SAML Examples

Example 1: Corporate Application Access

Picture a healthcare organization that needs employees to access their electronic health records system, HR portal, and training documentation platform. With SAML, staff authenticate once through the corporate identity provider, and that's it. SAML takes care of passing their credentials and role information to each application. The EHR system receives SAML assertions containing department and role attributes, so appropriate access levels are granted automatically.

Example 2: Cloud Service Integration

A manufacturing company has their on-premises Active Directory but also uses several cloud applications: CRM, supply chain management, and quality documentation systems. SAML bridges the gap, letting employees access all these cloud services with their existing corporate credentials. Meanwhile, IT keeps centralized control over access policies and can shut off access across every system instantly when someone leaves the company.

SAML vs OAuth

SAML and OAuth get mentioned together a lot, but they actually serve different purposes in identity and access management.

AspectSAMLOAuth 2.0
PurposeAuthentication (verifying identity)Authorization (granting access to resources)
Data FormatXMLJSON
Best ForEnterprise web SSO, traditional web appsAPI access, mobile apps, modern web apps
Token TypeXML assertionsAccess tokens (often JWT)

How Glitter AI Helps with SAML

Glitter AI supports SAML authentication so it can plug right into your existing enterprise identity management setup. Organizations can configure SAML-based single sign-on, which means team members access Glitter's documentation and training content using the same corporate credentials they already have. No separate login to remember, no extra password to manage. People can just start creating screen recordings, process documentation, and training materials.

For companies with strict security requirements, SAML integration means access to documentation repositories follows the same role-based access control policies you use everywhere else. IT administrators keep visibility and control over who can access, create, and share documentation. Compliance requirements get met, but the documentation workflow stays smooth.

Turn any process into a step-by-step guideTeach your co-workers or customers how to get stuff done – in seconds.
Start for Free

Frequently Asked Questions

What does SAML stand for?

SAML stands for Security Assertion Markup Language. It's an XML-based open standard for exchanging authentication and authorization data between identity providers and service providers.

What is SAML authentication?

SAML authentication is a process where an identity provider verifies who you are and passes a signed SAML assertion to a service provider. This lets you access applications without entering separate credentials for each one.

How does SAML SSO work?

SAML SSO works by establishing trust between an identity provider and service providers. When you try to access an application, you get redirected to the identity provider to authenticate. After that, you receive a SAML assertion that grants access to what you requested.

What is the difference between SAML and SSO?

SSO (Single Sign-On) is a concept where you can access multiple applications with one login. SAML is a protocol that makes SSO possible by providing a standardized way to exchange authentication data between systems.

Is SAML still used in 2026?

Absolutely. SAML remains widely used in enterprise environments for web-based SSO. Newer protocols like OpenID Connect have gained popularity for modern applications, but SAML continues to be the go-to standard for many enterprise and legacy system integrations.

What is the difference between SAML and OAuth?

SAML handles authentication (verifying who you are), while OAuth handles authorization (granting access to resources). SAML uses XML and shows up mostly in enterprise SSO scenarios, while OAuth uses JSON and is common for API access and mobile apps.

What are SAML assertions?

SAML assertions are XML documents that contain statements about a user's identity, authentication status, and attributes. The identity provider digitally signs them and sends them to service providers to grant access.

What is a SAML identity provider?

A SAML identity provider (IdP) is the system that authenticates users and creates SAML assertions. Okta, Azure AD, and OneLogin are common examples. The IdP holds user credentials and issues authentication tokens.

What is a SAML service provider?

A SAML service provider (SP) is an application or system that depends on an identity provider to authenticate users. When someone tries to access it, the SP redirects them to the identity provider and accepts SAML assertions to let them in.

How do you implement SAML authentication?

To implement SAML, you need to configure a trust relationship between your identity provider and service provider. This involves exchanging metadata, setting up assertion endpoints, and configuring how user attributes map between systems.

Turn any process into a step-by-step guideGet Started

Turn any process into a step-by-step guide

Create SOPs and training guides in minutes
Glitter AI captures your screen and voice as you work, then turns it into step-by-step documentation with screenshots. No writing required.
Try Glitter AI Free