Skip to content

Jackie Chen's IT Workshop

We are all apprentices in a craft where no one ever becomes a master.

  • BLOG
  • CONTACT
  • DEVOPS
  • LEARNING
  • PROJECTS
  • TSM
  • VIDEO

Tag: SSO

SP-initiated vs IDP-initiated SSO


A nice diagram that I found on Okta illustrates the workflow of both SP-initiated and IDP-initialed SSO. Reference: https://developer.okta.com/standards/SAML/index http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf  

Jackie Chen Bookmarks, Security Leave a comment December 6, 2017December 11, 2017 1 Minute

Translate

Search

Archives

Tags

AD Akamai Apache API Atlassian Automation AWS Backup Exec bamboo Bash Batch Script CentOS Challenge ChatOps Cisco Cloud Cluster Codebuild Confluence DAG DevOps docker Elastic Beanstalk ELB ePO EVA Exchange Fedora Foreman Git Hubot Hyper-V IAM Java Jira Kubernetes Lambda Linux Lync Nagios Nginx Nodejs OpenShift Outlook PCI PowerShell Puppet Python RDS RHEL S3 S60 V3 SAN SCOM SCVMM Security SharePoint Slack SQL Server SSM StorWize Sumologic troubleshooting Trusted Advisor TSM tsung Ubuntu vCO VCOPS VMware VPN Windows Wireless XenApp Xymon

Categories

  • Atlassian (73)
  • Bookmarks (8)
  • Chanllenges (3)
  • Citrix (12)
  • Cloud (160)
  • Linux (134)
  • Microsoft (96)
  • Mobile (7)
  • Monitoring (39)
  • Network (51)
  • Others (13)
  • Scripting (136)
  • Security (63)
  • Storage (81)
  • Virtualization (135)
  • WWW (18)

Top Posts & Pages

  • Hyper-V: A device attached to the system is not functioning
  • Nginx Sample Config of HTTP and LDAPS Reverse Proxy
  • Fail to quiesce a virtual machine while taking snapshot
  • When KMS key grant is created for Lambda execution role?
  • PowerShell: Check VMware Tools Status
  • Perl: Read Excel Cell Value
  • AWS IAM Roles Anywhere
  • Access Specific EC2 behind ALB
  • AWS ELB (CLB) vs ALB vs NLB
  • Configure Synergy as systemd service

Recent Comments

Gene on Fail to quiesce a virtual mach…
Elisa Caldwell on TSM
John on Ansible example – get di…
RJI on Fail to quiesce a virtual mach…
Serverless Ingress S… on Two Examples of using AWS Netw…
Automate VPN failove… on Automate VPN connection and it…
AWS IAM Roles Anywhe… on Setup AWS “Instance Prof…
AWS Cost Anomaly Det… on Why QuickSight increases Cloud…
Why QuickSight incre… on AWS Cost Anomaly Detectio…
Eric Kimminau on PowerShell: Using Credential F…
Website Powered by WordPress.com.
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
  • Follow Following
    • Jackie Chen's IT Workshop
    • Join 156 other followers
    • Already have a WordPress.com account? Log in now.
    • Jackie Chen's IT Workshop
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...