Security Assertion Markup Language (SAML) is an open standard for exchanging authentication and authorization data between an identity provider and a service provider, enabling single sign-on across enterprise applications.
‍
Before SSO standards like SAML, enabling centralized authentication across enterprise applications meant either maintaining shared credential databases—a security and operational nightmare—or building bespoke integration work for every application pair. SAML introduced a federated model that solved this at scale: a trusted third party, the identity provider, vouches for the user's identity by issuing a cryptographically signed assertion. The receiving application, the service provider, trusts that assertion without needing to manage or verify credentials itself.
‍
The result is the enterprise SSO experience most employees take for granted: one login through Okta, Microsoft Entra, or Google Workspace that opens access to dozens of connected applications. Behind that experience, SAML assertions are being generated, transmitted, and validated with each authentication event.
‍
A typical SAML SSO flow:
The service provider never sees the user's credentials. Trust is established through the IdP's digital signature, which the service provider verifies against the IdP's published certificate.
‍
SAML governance is only as broad as the set of applications configured to use it. Applications that don't support SAML, haven't been integrated with the IdP, or that employees access through personal email addresses or direct signups operate entirely outside SAML's governance scope.
‍
In practice, most organizations have SAML coverage over their core, IT-managed applications and significant blind spots in everything else. Shadow SaaS applications adopted by employees independently will never appear in the IdP's application catalog. Personal accounts used for work—a Slack workspace someone set up for a project, a Figma account connected to a personal Gmail—generate no SAML assertions and receive no SAML-based governance.
‍
Learn how Nudge Security surfaces SaaS access beyond the IdP's field of view →