GenAuth DocsDocuments
Concepts
User Guide
Development Integration
Metadata
Development Integration
Multi-tenant (beta)
Console Documentation
Multi-tenant Console
Tenant Console
Saas Application Demo
Concepts
User Guide
Development Integration
Metadata
Development Integration
Multi-tenant (beta)
Console Documentation
Multi-tenant Console
Tenant Console
Saas Application Demo
Old version
Concepts
  • What is GenAuth
  • What is User Pool
  • What is Application
  • What is Authentication
  • What is Federation Authentication
  • What is Zero Trust Network
  • Single Sign-On and Single Sign-Out
  • What is Authorization
  • Authentication vs Authorization
  • What is JWT Token
  • What is ID Token
  • What is Access Token
  • What is Refresh Token
  • Access Token vs Id Token
  • Understanding OIDC and OAuth2.0 Protocol

  • Understanding SAML2 Protocol

    • SAML2 Overview
    • SAML2 Flow
  • What is Multi-Factor Authentication
  • Account Lifecycle Management
  • Hosted Login Page vs Embeddable Login Component
  • CIAM and EIAM
  • What is LDAP
  • How QR Code Login Works
  • Basic Concepts of Cryptography
  1. Concepts
  2. /
  3. Understanding SAML2 Protocol

  4. /
  5. SAML2 Flow

¶ Understanding SAML Process

Update time: 2025-04-11 11:21:15
Edit

This article describes the data interaction process between SP, IdP, and browser in SAML.

¶ Subjects involved in SAML protocol

When using SAML protocol for identity authentication, the following three subjects are involved

Browser: SP and IdP communicate with each other through the browser

SP: Resource provider

IdP: Identity provider

¶ The whole process from initiating SAML login to successful login

  1. The user tries to log in to the application provided by SP.

  2. SP generates SAML Request and sends SAML Request to IdP through browser redirection.

  3. IdP parses SAML Request and redirects the user to the authentication page.

  4. The user completes the login on the authentication page.

  5. The IdP generates a SAML Response and returns the SAML Response to the ACS address of the SP by redirecting the browser, which contains the SAML Assertion used to determine the user's identity.

  6. The SP verifies the content of the SAML Response.

  7. The user successfully logs in to the application provided by the SP.

¶ Communication method between SP and IdP

The communication methods between SP and IdP are divided into HTTP Redirect Binding, HTTP POST Binding, and HTTP Artifact Binding. Each method uses different types of HTTP to communicate with each other at different stages.

¶ HTTP Redirect Binding

The SP sends the SAML Request to the IdP by redirecting the GET request, and the IdP sends the SAML Response to the SP by POST request through the Form form that is immediately submitted.

¶ HTTP POST Binding

SP sends SAML Request to IdP in POST request through Form form submitted immediately. IdP sends SAML Response to SP in POST request through Form form submitted immediately.

¶ HTTP Artifact Binding

SP and IdP only exchange the index number of SAML Request and SAML Response through the browser. After receiving the index number, they request the Artifact Resolution Service interface of the other party in the backend to obtain the real request entity content. This avoids the exposure of SAML Request and SAML Response to the frontend.

Previous article: SAML2 Overview Next article: What is Multi-Factor Authentication
  • Subjects involved in SAML protocol
  • The whole process from initiating SAML login to successful login
  • Communication method between SP and IdP

User identity management

Integrated third-party login
Customized authentication process

Enterprise internal management

Single sign-on
Multi-factor authentication
Permission management

Developer

Development Documentation
GitHub (opens new window)

Company

official@genauth.ai
16th Floor, Building B, Beichen Century Center, Chaoyang District, Beijing (Total)
Room 406, 4th Floor, Block B, No. 200, Tianfu Fifth Street, High-tech Zone, Chengdu (Branch)

© Beijing Steamory Technology Co., Ltd.