A security professional has been assigned to assess a web application. The assessment report recommends switching to Security Assertion Markup Language (SAML). What is the PRIMARY security benefit in switching to SAML?
A.
It enables single sign-on (SSO) for web applications.
B.
It uses Transport Layer Security (TLS) to address confidentiality.
C.
It limits unnecessary data entry on web forms.
D.
The users' password is not passed during authentication.
SAML SSO (SINGLE SIGN-ON): SAML provides security by eliminating passwords for an app and replacing them with security tokens. Since we do not require any passwords for SAML logins, there is no risk of credentials being stolen by unauthorized users. It provides faster, easier, and trusted access to cloud applications.
https://blogs.sap.com/2017/04/13/configure-saml-sso-for-sap-cloud-platform-using-an-external-identity-provider/
You need (usually) to enter the credentials during the first steps to authenticate to the IDP
The actual password isn't transmitted during modern authentication, not just in single sign-on. SAML enables single sign-on, the benefit is that users only need 1 password. So the answer is A.
no wonder so many people fail cissp. So many answers are thinking too technical and closed minding saying SSO isnt a security benefit. How is users needing to remember less credentials and having less password resets not a security benefit?
While using tokens is a benefit of Saml its not the primary one. Infact SAML tokens can be targets just as much as a password, hash, or ticket can
Answer: It enables single sign-on (SSO) for web applications - 1.1 Drivers of SAML Adoption - SSO https://www.oasis-open.org/committees/download.php/20645/sstc-saml-tech-overview-2%200-draft-10.pdf
7.1 Web Browser Single Sign-On (SSO) Profiles Note that user authentication at the source site is explicitly out of scope, as are issues related to this source site authentication
https://docs.oasis-open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf
SAML's PRIMARY security benefit is the enablement of Single Sign-On (SSO) for web applications, which enhances security, user experience, and operational efficiency. While not passing the user's password during authentication is a significant security advantage, it is secondary to the core functionality of SAML, which is to facilitate SSO and provide a secure means of identity and access management.
So, the correct answer is:
A. It enables Single Sign-On (SSO) for web applications.
C. is an important aspect of SAML but it is not the PRIMARY security benefit of SAML.
D. The question clearly asks for security benefit. It seems that not sending passwords is the direct security benefit.
"Without SAML or other SSO technologies, applications would have to rely on passwords to verify their users, which is problematic....With SAML, SPs only have to store public keys, which are useless to attackers without the private keys held by the IdP."
https://developer.okta.com/blog/2019/07/30/saml-whats-behind-sso
The question is asking for primary SECURITY benefit. SSO is ease of use benefit, where for D, token is being used instead of password, which is more secure. So the answer id D
CISSP Official Study Guide pg 691 - "Security Assertion Markup Language (SAML) is an open XML-based standard commonly used to exchange authentication and authorization (AA) information between federated organizations. It provides SSO capabilities for browser access."
CISSP Official Study Guide pg 659 - "Single sign-on (SSO) is a centralized access control technique that allows a subject to be authenticated once on a system and access multiple resources without authenticating again. SSO is convenient for users, but it also has security benefits. When users have to remember multiple usernames and passwords, they often resort to writing them down, ultimately weakening security. Users are less likely to write down a single password. SSO also eases administration by reducing the number of accounts required for a subject."
"Yes, the correct answer is D. The primary security benefit of using SAML is that the users' passwords are not passed during authentication, which helps to improve security and protect against password-based attacks such as interception or theft. SAML uses security tokens to authenticate users, which are exchanged between the identity provider and service provider, and do not contain any user credentials such as passwords. This helps to maintain the confidentiality of user passwords and reduce the risk of compromise." ChatGPT
A. is the answer .
It enables single sign-on (SSO) for web applications.
SAML primarily enables Single Sign-On (SSO) which allows users to authenticate once and access multiple web applications without needing to enter their credentials multiple times. It also allows for centralization of authentication which makes it easier for IT departments to manage users access and permissions for multiple web applications.
SAML Provides Increased Security, SSO is definitely an advantage, but from a security benefit point of view, D is the best answer.
SAML provides a single point of authentication, which happens at a secure identity provider. Then, SAML transfers the identity information to the service providers. This form of authentication ensures that credentials are only sent to the IdP directly.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Rollizo
Highly Voted 2 years, 1 month agojackdryan
1 year, 6 months agoRollizo
2 years, 1 month agoJohnBentass
Most Recent 5 months, 1 week agoCCNPWILL
5 months, 3 weeks agoTheManiac
6 months, 1 week agoklarak
6 months, 2 weeks agotheMech
7 months, 1 week agoeboehm
7 months, 2 weeks agoeboehm
7 months, 2 weeks agoGuardianAngel
9 months, 2 weeks agoSoleandheel
11 months, 2 weeks agoWoo7
9 months, 3 weeks agoCoolCat22
11 months, 4 weeks agoxxxBadManxxx
1 year, 4 months agoHughJassole
1 year, 5 months ago[Removed]
1 year, 8 months agoRVoigt
1 year, 9 months agoRVoigt
1 year, 8 months agoliledag
1 year, 8 months agoDee83
1 year, 10 months agoevenkeel
1 year, 10 months agorajkamal0
1 year, 11 months ago