SAML is like a passport or visa. He has (trusted) information about you, which can be used to obtain information about you (for example, your name, DOB) and conclude that you can receive (for example, entry into the country). You can use the properties in the token to request other systems for additional information that you could associate (for example, in a bank statement).
Thus, similarly, SAML is usually used to authenticate users in the system (as soon as you trust its source), but there are no provisions for managing user profiles or "resources".
Authorization decisions, if any, are often performed based on attributes associated with the user (for example, the group to which he belongs), and are transmitted at security points in the security token.
Perhaps the first questions to answer are why you want to move away from LDAP and think about SAML. Is it because you want users to register with their credentials? This is because you generally want to get rid of the LDAP server.
You can well keep your LDAP server for managing resources associated with users and authenticate users elsewhere. This is what you have now. You would map users "outside" and "inside" using a common attribute (for example, username or some identifier).
If you want to completely get rid of LDAP, you will need a place to store this information (for example, the application database).
Eugenio pace
source share