{"id":6849,"date":"2025-05-23T13:41:13","date_gmt":"2025-05-23T12:41:13","guid":{"rendered":"https:\/\/www.jollydeck.com\/academy\/?p=6849"},"modified":"2025-05-23T13:41:14","modified_gmt":"2025-05-23T12:41:14","slug":"sso-jollydeck-saml-vs-oauth-explained","status":"publish","type":"post","link":"https:\/\/www.jollydeck.com\/academy\/sso-jollydeck-saml-vs-oauth-explained\/","title":{"rendered":"SSO options for JollyDeck: SAML vs. OAuth explained"},"content":{"rendered":"\n<p>Single Sign-On (SSO) simplifies the login process by allowing users to access multiple applications with a single set of credentials. For platforms like JollyDeck, SSO means easier access for your team and stronger security for your organisation.<\/p>\n\n\n\n<p>Below, we answer the most common questions about SSO on JollyDeck, including the differences between SAML and OAuth, their pros and cons, and how to get started.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What SSO options does JollyDeck support?<\/strong><\/h2>\n\n\n\n<p><strong>JollyDeck supports several authentication methods:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>OAuth 2.0 \/ OpenID Connect<\/strong>: Our recommended SSO method, ideal for modern, cloud-based systems. Supports providers like Google, Microsoft Azure AD, Okta, and more.<\/li>\n\n\n\n<li><strong>SAML 2.0<\/strong>: A traditional enterprise SSO option for integration with corporate identity providers (e.g. ADFS).<\/li>\n\n\n\n<li><strong>Active Directory \/ LDAP<\/strong>: For organisations with on-premise directory infrastructure.<\/li>\n\n\n\n<li><strong>Manual Accounts<\/strong>: Direct login credentials for users without SSO access.<\/li>\n\n\n\n<li><strong>Self-Registration<\/strong>: Enables users to create their own accounts for quick onboarding.<\/li>\n<\/ol>\n\n\n\n<p>For the latest updates and configuration details, contact JollyDeck support.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What is SAML?<\/strong><\/h2>\n\n\n\n<p><strong>SAML (Security Assertion Markup Language)<\/strong> is an older Single Sign-On standard that lets an Identity Provider (IdP) verify a user\u2019s identity for multiple services (Service Providers) through one login. SAML messages use XML, which was the norm for enterprise identity systems. SAML enables users to log in once and access multiple applications securely.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What is OAuth?<\/strong><\/h2>\n\n\n\n<p><strong>OAuth<\/strong> is a newer framework focused on authorization. It grants third-party applications limited access to resources on a user\u2019s behalf. Instead of sharing passwords, OAuth uses temporary tokens, and when combined with <strong>OpenID Connect<\/strong> (which adds user identity on top), it can serve as a full single sign-on solution.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What\u2019s the difference between SAML and OAuth?<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Feature\/Aspect<\/strong><\/td><td><strong>SAML<\/strong><\/td><td><strong>OAuth<\/strong><\/td><\/tr><tr><td><strong>Core function<\/strong><\/td><td>User authentication (verifying identity) and SSO between services.<\/td><td>Delegated authorization (access control); with OIDC, it also handles user authentication for SSO.<\/td><\/tr><tr><td><strong>Data format<\/strong><\/td><td>XML-based messages (SAML assertions)<\/td><td>JSON (typically uses JWT \u2013 JSON Web Tokens)<\/td><\/tr><tr><td><strong>Security<\/strong><\/td><td>Employs XML digital signatures &amp; encryption of assertions (high security)<\/td><td>Depends on secure tokens over HTTPS (TLS); trust is placed in token secrecy and transport security.<\/td><\/tr><tr><td><strong>Complexity<\/strong><\/td><td>Complex to implement (involves XML, multiple configurations; designed with older systems in mind)<\/td><td>Lightweight and easier to implement (JSON\/REST design is developer-friendly)<\/td><\/tr><tr><td><strong>Best suited for<\/strong><\/td><td>Large enterprises or government systems with established identity federations (legacy IdPs).<\/td><td>Cloud-first applications, mobile or single-page apps, and APIs \u2013 basically any modern platform where flexibility and speed matter.<\/td><\/tr><tr><td><strong>Ecosystem compatibility<\/strong><\/td><td>Built into many legacy enterprise ecosystems (works with older standard enterprise SSO frameworks)<\/td><td>Widely adopted in cloud and SaaS ecosystems; standard for integrating with newer identity providers and services.<\/td><\/tr><tr><td><strong>Performance<\/strong><\/td><td>Relatively heavy: verbose XML can make transactions slower and consume more resources<\/td><td>High-performance: lightweight tokens pass minimal data, making it quicker<\/td><\/tr><tr><td><strong>Authentication<\/strong><\/td><td>Yes (proves identity)<\/td><td>Only with OpenID Connect extension<\/td><\/tr><tr><td><strong>Authorization<\/strong><\/td><td>Yes (via attributes\/roles)<\/td><td>Yes (main purpose)<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What are the pros and cons of SAML vs. OAuth?<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>SAML<\/strong><\/h3>\n\n\n\n<p><strong>Pros:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Proven security:<\/strong> SAML messages are signed and can be encrypted, protecting sensitive authentication data in transit.<\/li>\n\n\n\n<li><strong>Enterprise-proven SSO:<\/strong> A mature and widely adopted standard used by large enterprises and government agencies.<\/li>\n\n\n\n<li><strong>Broad compatibility:<\/strong> Integrates seamlessly with traditional identity systems like Active Directory, LDAP, and older SSO frameworks.<\/li>\n<\/ul>\n\n\n\n<p><strong>Cons:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Complex setup:<\/strong> Configuring SAML involves managing metadata, exchanging certificates, and maintaining XML schemas.<\/li>\n\n\n\n<li><strong>XML overhead:<\/strong> SAML\u2019s verbose message format can slow down integrations and increase processing demands.<\/li>\n\n\n\n<li><strong>Not mobile-friendly:<\/strong> Lacks native support for mobile and single-page applications, requiring workarounds or additional tooling.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>OAuth (with OpenID Connect)<\/strong><\/h3>\n\n\n\n<p><strong>Pros:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Built for today\u2019s cloud:<\/strong> OAuth 2.0 with OIDC is the standard for SaaS applications and cloud identity providers.<\/li>\n\n\n\n<li><strong>Fast setup:<\/strong> Lightweight JSON-based messages and fewer configuration steps mean quicker integrations.<\/li>\n\n\n\n<li><strong>Widespread support:<\/strong> Supported out of the box by Google, Microsoft Azure AD, Okta, and most other major identity platforms.<\/li>\n\n\n\n<li><strong>API-friendly:<\/strong> Designed to grant limited access to APIs without sharing passwords, ideal for modern, interconnected systems.<\/li>\n\n\n\n<li><strong>No password sharing:<\/strong> Keeps credentials secure by using short-lived tokens over secure HTTPS connections.<\/li>\n<\/ul>\n\n\n\n<p><strong>Cons:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Needs an identity layer:<\/strong> OAuth by itself doesn\u2019t handle user login; OpenID Connect is required to authenticate users.<\/li>\n\n\n\n<li><strong>Requires careful implementation:<\/strong> Security depends on best practices like proper token handling, secure storage, and HTTPS.<\/li>\n<\/ul>\n\n\n\n<p>While both protocols offer secure and widely adopted SSO solutions, the best choice depends on your organisation&#8217;s identity infrastructure and use cases. OAuth 2.0 with OpenID Connect typically suits modern, cloud-native environments where speed, flexibility, and interoperability are paramount. SAML, on the other hand, remains a robust option for organisations operating traditional enterprise systems with established identity management tools.<\/p>\n\n\n\n<p>At JollyDeck, we support both protocols and tailor integration recommendations based on your technical setup and security posture. Whether you\u2019re deploying in a modern SaaS environment or connecting to on-premise directories, we\u2019ll help you implement the most effective and seamless SSO experience.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Authentication and login options<\/strong><\/h2>\n\n\n\n<p>JollyDeck supports a range of login methods to suit diverse organisational setups. While both SAML and OAuth are available, <strong>we typically recommend OAuth 2.0 with OpenID Connect<\/strong> for most organisations.<\/p>\n\n\n\n<p>OAuth offers:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A streamlined and intuitive login flow that improves the user experience<\/li>\n\n\n\n<li>Quick integration with leading identity providers like Azure AD, Google, and Okta<\/li>\n\n\n\n<li>Support for modern web and mobile environments, as well as API-based integrations<\/li>\n\n\n\n<li>Simplified setup and ongoing maintenance compared to legacy protocols like SAML<\/li>\n<\/ul>\n\n\n\n<p>However, if your organisation has existing SAML infrastructure &#8211; such as Active Directory Federation Services (ADFS) or other XML-based systems &#8211; JollyDeck also provides robust support for SAML-based SSO.<\/p>\n\n\n\n<p>Whatever your choice, our team ensures secure implementation and can guide you through best practices for protecting user credentials and maintaining compliance.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>When should I use SAML vs. OAuth with JollyDeck?<\/strong><\/h2>\n\n\n\n<p>Use <strong>SAML<\/strong> if:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Your organisation relies on on-premise identity systems or traditional enterprise tools<\/li>\n\n\n\n<li>You&#8217;re using an identity provider like ADFS that communicates primarily via SAML<\/li>\n\n\n\n<li>Your internal IT policies or infrastructure mandate XML-based authentication flows<\/li>\n<\/ul>\n\n\n\n<p>Use <strong>OAuth 2.0 with OpenID Connect<\/strong> if:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>You want fast, modern integration with minimal configuration<\/li>\n\n\n\n<li>You\u2019re using cloud identity providers like Okta, Microsoft Azure AD, or Google Workspace<\/li>\n\n\n\n<li>You plan to integrate JollyDeck with web or mobile applications<\/li>\n\n\n\n<li>You require delegated access or plan to interact with APIs securely<\/li>\n<\/ul>\n\n\n\n<p>For most cloud-first organisations and modern technology environments, <strong>OAuth (via OpenID Connect) typically provides the best balance<\/strong> of security, usability, and ease of integration.<\/p>\n\n\n\n<p>Still not sure? Our support team is ready to assess your setup and recommend the most effective integration path.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How do I set up SSO on JollyDeck?<\/strong><\/h2>\n\n\n\n<p><strong>SAML Setup<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Configure your Identity Provider (IdP) according to SAML 2.0 specifications<\/li>\n\n\n\n<li>Share the SAML metadata or endpoint URL with JollyDeck for service provider configuration<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>OAuth \/ OpenID Connect Setup<\/strong><\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Register JollyDeck as a new application in your identity provider\u2019s admin console (e.g. Azure AD, Okta, Google)<\/li>\n\n\n\n<li>Provide client ID, client secret, and discovery URL (or well-known endpoint) to JollyDeck<\/li>\n\n\n\n<li>Our team will configure the connection and test the flow with your user group<\/li>\n<\/ol>\n\n\n\n<p><strong>LDAP \/ Active Directory Setup<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Ensure your directory server is securely accessible by JollyDeck<\/li>\n\n\n\n<li>Provide binding credentials and configuration settings for synchronisation<\/li>\n\n\n\n<li>We\u2019ll establish the connection and verify user provisioning and access controls<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Are there any security considerations?<\/strong><\/h2>\n\n\n\n<p>Both SAML and OAuth can be implemented securely when best practices are followed:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>SAML:<\/strong> Secures communication via XML signatures and encryption. Ensure certificates are rotated periodically and metadata is up-to-date.<\/li>\n\n\n\n<li><strong>OAuth:<\/strong> Relies on secure token handling and HTTPS. Ensure tokens are short-lived, securely stored, and access scopes are tightly defined.<\/li>\n<\/ul>\n\n\n\n<p>Our team helps you implement each protocol in a way that aligns with your organisation\u2019s security and compliance requirements.<\/p>\n\n\n\n<p>Always follow best practices for both protocols to protect user data.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What if I need more flexibility or have unique requirements?<\/strong><\/h2>\n\n\n\n<p>If your organisation needs a hybrid approach, custom authentication flow, or integration with a niche identity provider, <a href=\"mailto:support@jollydeck.com\">contact our support team<\/a>. We\u2019ll work with you to design a secure and efficient solution that fits your specific needs.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Conclusion<\/strong><\/h2>\n\n\n\n<p>JollyDeck supports a full range of authentication options for organisations of all sizes and technical setups. Whether you&#8217;re using OAuth, SAML, LDAP, or simple login credentials, our goal is to make access easy, secure, and scalable. If you&#8217;re unsure which protocol is best for your organisation, reach out and we&#8217;ll help you choose the right path.<\/p>\n\n\n\n<p>If you&#8217;re unsure which approach best fits your setup, our team is available to advise and support your integration process.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Single Sign-On (SSO) simplifies the login process by allowing users to access multiple applications with a single set of credentials. For platforms like JollyDeck, SSO means easier access for your team and stronger security for your organisation. Below, we answer &hellip; <a href=\"https:\/\/www.jollydeck.com\/academy\/sso-jollydeck-saml-vs-oauth-explained\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":6850,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9,3],"tags":[],"class_list":["post-6849","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-development"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.jollydeck.com\/academy\/wp-json\/wp\/v2\/posts\/6849","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.jollydeck.com\/academy\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.jollydeck.com\/academy\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.jollydeck.com\/academy\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jollydeck.com\/academy\/wp-json\/wp\/v2\/comments?post=6849"}],"version-history":[{"count":1,"href":"https:\/\/www.jollydeck.com\/academy\/wp-json\/wp\/v2\/posts\/6849\/revisions"}],"predecessor-version":[{"id":6851,"href":"https:\/\/www.jollydeck.com\/academy\/wp-json\/wp\/v2\/posts\/6849\/revisions\/6851"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.jollydeck.com\/academy\/wp-json\/wp\/v2\/media\/6850"}],"wp:attachment":[{"href":"https:\/\/www.jollydeck.com\/academy\/wp-json\/wp\/v2\/media?parent=6849"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.jollydeck.com\/academy\/wp-json\/wp\/v2\/categories?post=6849"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.jollydeck.com\/academy\/wp-json\/wp\/v2\/tags?post=6849"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}