An increasing number of organisations are embracing software-as-a-service or integrating social-media into their consumer facing websites.  Securing access to these external services for employees or authenticating customers using a social media identity is a common problem and an alphabet soup of standards and libraries has sprung up in response including SAML, SCIM, Open ID, Open ID Connect, OAuth, OAuth2 and many others.  These standards and protocols are increasingly mature – they're baked into vendor offerings and RFPs

A recent vulnerability analysis of SAML by researchers at the University of Bochum in Germany highlights the dangers of blindly trusting third-party libraries and protocols.  In an ingenious attack they managed to manipulate the SAML token to successfully pretend to be any authenticated user they wished.

The attack didn't require network access or any high privilege; they simply manipulated the digitally signed token and managed to fool 11 of the 14 major SAML frameworks into accepting their bogus credentials.  Given the potential for widespread access and the relative ease of exploit this is a significant issue and neatly highlights the danger of familiarity.

SAML, to continue with this example, is now so baked into federation thinking and the everyday language of products that it's just assumed to be secure; "everyone's doing it so if we use a well-known library we're safe right?" This exploit serves to highlight how a continued professional scepticism is still required even if we're comfortable with the technology – use the standard, implement the library, but, never blindly trust just because everybody knows how it works.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.