IAM Consultant

4 days ago


Minneapolis, United States C4 Technical Services Full time
Position: SAML Consultant
Location: 100% remote


Required:
  • SAML Expert
  • Okta
  • working with custom apps - 80% java / 20% .net (nice to have)
Follow Process:
  1. Discovery phase
  2. Mobilize plan phase
  3. Build and iterate phase
  4. Support and transition phase

The titles for resources with expertise in SAML who can help with implementing SAML flows for your new SEL (Security Enhanced Login) might include:
  1. SAML Specialist
  2. SAML Consultant
  3. Identity and Access Management (IAM) Specialist
  4. IAM Consultant
  5. SAML Integration Engineer
  6. Identity Management Architect
  7. Security Engineer with SAML Expertise
  8. Single Sign-On (SSO) Consultant
These professionals have the skills and experience needed to configure, troubleshoot, and secure SAML-based authentication and authorization flows.

SAML (Security Assertion Markup Language) is a standard for exchanging authentication and authorization data between parties, specifically between an identity provider (IdP) and a service provider (SP). An SAML resource refers to any web application, service, or system that relies on SAML for authentication and authorization. Here are the key components involved:
  1. Identity Provider (IdP): The entity that authenticates users and provides identity information to service providers. Examples include Active Directory Federation Services (ADFS), Okta, and OneLogin.
  2. Service Provider (SP): The entity that receives and accepts the authentication assertions from the IdP. Examples include web applications, cloud services, and other systems that users need access to.
  3. SAML Assertion: A piece of information that the IdP sends to the SP, containing user authentication and attribute information. It includes:
    • Authentication statements
    • Attribute statements
    • Authorization decision statements
  4. SAML Request: The message sent by the SP to the IdP to request authentication of a user.
  5. SAML Response: The message sent by the IdP back to the SP containing the SAML assertion.
Use Case
When a user tries to access an SAML resource (e.g., a web application that uses SAML for authentication), the following process typically occurs:
  1. Access Request: The user tries to access the protected resource at the service provider.
  2. Authentication Request: The service provider generates a SAML authentication request and redirects the user to the identity provider.
  3. User Authentication: The identity provider authenticates the user (e.g., through a login form).
  4. SAML Response: Upon successful authentication, the identity provider generates a SAML response containing the assertion and redirects the user back to the service provider.
  5. Assertion Validation: The service provider validates the SAML assertion.
  6. Access Granted: If the assertion is valid, the service provider grants the user access to the requested resource.
Benefits
  • Single Sign-On (SSO): Users can access multiple applications with a single set of login credentials.
  • Improved Security: Centralized authentication and reduced password proliferation.
  • Reduced Administrative Overhead: Simplified user management and streamlined access controls.
In summary, an SAML resource is any application or service that uses the SAML protocol to manage user authentication and authorization, leveraging the benefits of SSO and enhanced security.
#DICE
nkraft@c4techservices.com

  • Minneapolis, United States Best Buy Full time

    As a Senior Security Architect with Best Buy, you will work closely with our Digital, Analytics & Technology teams to deliver security requirements in the design phase, as well as to bridge the gap between IT / Engineering and the greater Enterprise Risk & Compliance practice. The Senior Security Architect will be the primary point of contact for many...


  • Minneapolis, United States Best Buy Careers Full time

    As a Senior Security Architect with Best Buy, you will work closely with our Digital, Analytics & Technology teams to deliver security requirements in the design phase, as well as to bridge the gap between IT / Engineering and the greater Enterprise Risk & Compliance practice. The Senior Security Architect will be the primary point of contact for many...


  • Minneapolis, United States Best Buy Careers Full time

    As a Senior Security Architect with Best Buy, you will work closely with our Digital, Analytics & Technology teams to deliver security requirements in the design phase, as well as to bridge the gap between IT / Engineering and the greater Enterprise Risk & Compliance practice. The Senior Security Architect will be the primary point of contact for many...


  • Minneapolis, United States C4 Technical Services Full time

    Job DescriptionJob DescriptionTop Skills:Cloud Security Engineer (5+ years of exp)Must have strong GCP experience AWS and AzureDiverse candidates is a plusCloud Security EngineerLocation: MN12-month contractJob Summary:The Senior Cloud Security Engineer helps architect, deploy, and operate the security cloud infrastructure that aligns with business needs....


  • Minneapolis, MN, United States Best Buy Careers Full time

    As a Senior Security Architect with Best Buy, you will work closely with our Digital, Analytics & Technology teams to deliver security requirements in the design phase, as well as to bridge the gap between IT / Engineering and the greater Enterprise Risk & Compliance practice. The Senior Security Architect will be the primary point of contact for many...


  • Minneapolis, MN, United States Best Buy Full time

    As a Senior Security Architect with Best Buy, you will work closely with our Digital, Analytics & Technology teams to deliver security requirements in the design phase, as well as to bridge the gap between IT / Engineering and the greater Enterprise Risk & Compliance practice. The Senior Security Architect will be the primary point of contact for many...