
As an IT leader, you operate at the intersection of technology, risk, and strategy. You are asked to greenlight digital transformation projects, assure the board of your security posture, and select vendors who promise seamless, future-proof solutions.
The success of these high-stakes decisions often hinges not on the surface-level features of a product, but on the foundational protocols that govern your organization's digital identities.
The stakes are higher than ever. The average enterprise manages hundreds of SaaS applications, with a significant percentage of apps remaining outside identity provider (IdP) control. These disconnected apps create blind spots that expose organizations to security breaches and operational inefficiencies. Thus, understanding identity protocols is a critical component of enterprise risk management.
Making the right call between two identity and access management (IAM) platforms, confidently assessing a vendor's claims about "zero-trust" compatibility, or ensuring your cloud migration strategy is compliant with the General Data Protection Regulation (GDPR) from day one requires more than just trusting your team.
You need strategic comprehension, too, and that's where a working knowledge of the security assertion markup language (SAML) protocol, OpenID connect (OIDC), and the system for cross-domain identity management (SCIM) becomes indispensable.
Ultimately, leaders who grasp these core concepts can steer their organizations with greater precision—negotiating better vendor contracts, future-proofing their infrastructure, and driving innovation with confidence.
This guide is built for that purpose. It will demystify SAML, OIDC, and SCIM from a leadership perspective, focusing on the strategic implications so you can guide your teams, manage risk, and make the informed decisions your role demands.
The foundation: understanding authentication, authorization, and provisioning
Before diving into the frameworks themselves, let's establish a clear understanding of the core concepts using a simple analogy: a luxury hotel.
Imagine this hotel has a problem that mirrors what every IT leader faces today: some guests are staying in rooms, but the hotel doesn't know about it. These rooms were booked directly via the housekeeping staff or through unauthorized third-party websites, or the guests simply found some rooms unlocked and occupied them.
Just as the hotel's central reservation system can't manage what it doesn't know about, your IdP can't secure applications it can't see. The hotel still needs to ensure safety, maintain service standards, and collect payment for all guests, irrespective of how they entered the premises.
Similarly, you're responsible for security, compliance, and cost optimization across the entire application portfolio, not just for the ones integrated with your IdP.
Authentication: "Who are you?"
To continue with the hotel analogy, when you check in, the first thing you do is show your ID at the front desk. The clerk verifies who you claim to be by checking your identification against their reservation system.
In the digital world, authentication serves the same purpose of verifying a user's identity. It answers the fundamental question: "Are you who you say you are?"
As an IT leader, strong authentication is your first line of defense against unauthorized access. It reduces security breaches and dramatically cuts down on password-related help desk tickets. When done right, it becomes invisible to users while providing robust protection.
Authorization: "What can you do?"
Once verified, the hotel clerk hands you a key card. This card grants you access to your specific room, the gym, and the business center—but not the penthouse suite or staff-only areas. Your permissions are precisely defined based on what you've paid for and your guest status.
Authorization determines what an authenticated user is allowed to access or do. It's about enforcing the principle of least privilege, ensuring users only have access to resources they actually need.
Proper authorization reduces internal security risks by limiting potential damage from compromised accounts or insider threats. It also helps maintain compliance by ensuring sensitive data access is appropriately controlled and auditable.
While authentication verifies identity and authorization controls access, organizations need a way to manage these permissions at scale. This is where provisioning comes into play.
Provisioning: "Getting you ready"
Here's where the hotel analogy gets really interesting. Before you even arrive, the hotel staff has prepared your room, activated your Wi-Fi access, and stocked your minibar based on your preferences. When you check out, they automatically deactivate your key card and close your account.
Provisioning is the automated process of creating, updating, and deactivating user accounts and their associated permissions across various systems. It's the behind-the-scenes work that ensures users have the right access at the right time.
Automated provisioning dramatically reduces the time and effort required for onboarding and offboarding employees. More importantly, it eliminates "ghost accounts"—orphaned user accounts that pose significant security risks when employees leave or change roles.
Now that we've established the foundations of identity management, let's explore the protocols that make it all work.
SAML: your digital passport system
SAML functions like a sophisticated digital passport system for web applications. When you log into one system, SAML creates a secure "passport" that tells other systems you're already verified, eliminating the need to log in repeatedly.
Think of SAML as a trusted intermediary between your IdP (where users log in, like Azure AD or Okta) and service providers (the applications your users need). When an employee tries to access Salesforce, for example, SAML facilitates a secure handshake between your identity system and Salesforce, confirming the user's identity and relevant permissions.
The beauty of SAML lies in its maturity and enterprise-grade security features. It uses digital certificates to establish trust relationships between systems and can carry detailed user attributes to help applications make authorization decisions.
SAML excels in traditional enterprise environments with established web applications. It's particularly valuable when you:
- Need to integrate with mature enterprise SaaS applications.
- Require strong, assertion-based security.
- Work primarily with browser-based applications.
- Have invested heavily in SAML-compatible identity infrastructure.
Business benefits of SAML
Enhanced user experience: Employees love not having to juggle dozens of passwords. SAML enables true single sign-on (SSO) for web applications, allowing users to access all their tools with one secure login.
Improved security posture: By centralizing authentication, SAML reduces password-related attack vectors and provides a single point for implementing strong authentication policies, including multi-factor authentication.
Simplified compliance: SAML makes it easier to audit who accessed what and when, providing the detailed logs that compliance frameworks often require.
Reduced support costs: Fewer passwords mean fewer password reset requests, directly reducing help desk burden and associated costs.
When SAML meets reality: the disconnected app challenge
Here's where the hotel analogy breaks down—and where IT leaders face their biggest headache. SAML works beautifully for applications that speak its language. But what about the 30-40% of applications in your portfolio that don't support SAML? These "disconnected apps" create identity silos that traditional frameworks simply can't reach.
The explosion of AI tools and niche applications means your identity infrastructure is constantly playing catch-up. Your employees need these tools to stay competitive, but they often lack enterprise-grade security features.
It's a classic technology paradox: the tools that make you most productive often create the biggest security gaps.
OIDC: authentication for the modern world
OIDC represents the evolution of digital identity for our API-driven, mobile-first world. Built on top of OAuth 2.0, OIDC provides a more flexible and developer-friendly approach to authentication and authorization.
While SAML is like a formal diplomatic passport, OIDC is more like a modern smartphone—versatile, lightweight, and designed for today's connected ecosystem. OIDC uses JSON-based tokens instead of XML, making it faster to process and easier for developers to implement.
The framework excels at handling complex scenarios that modern applications demand: native mobile apps, single-page web applications, and microservices architectures that need to securely communicate with each other.
OIDC is ideal when you're:
- Building or buying modern web applications.
- Supporting mobile applications or APIs.
- Implementing microservices architectures.
- In need of fine-grained control over data sharing.
- Working with developer teams who prefer JSON over XML.
OIDC vs. SAML: choosing the right tool
The choice between SAML and OIDC isn't about "better" or "worse"—it's about being fit for the purpose.
SAML remains excellent for traditional enterprise web SSO scenarios. It's mature, well-understood, and provides robust security features that many established organizations require.
The applications in your core enterprise SaaS stack: Salesforce, Workday, ServiceNow, or Microsoft365 expect SAML assertions (secure "packages" of information created to prove a user's identity), and can leverage the rich attribute passing (detailed user information—department, role, permissions) that SAML provides. When your compliance team requires detailed audit logs showing who accessed sensitive HR data in Workday, SAML's robust logging capabilities shine.
SAML is also your go-to choice when integrating with legacy enterprise applications that were built during the protocol's heyday, or when your security team requires the cryptographic rigor of XML digital signatures for regulatory compliance.
On the other hand, OIDC shines in modern application environments. It's better suited for mobile apps, APIs, and scenarios where you need granular control over what information is shared and what actions applications can perform.
Your development team's workflow, which includes GitHub for code repositories, Figma for design collaboration, and several AI coding assistants, are typically built with OIDC in mind. When developers need programmatic access to APIs, for instance, to integrate your CI/CD pipeline with cloud services, OIDC's token-based system provides the granular permissions and revocation capabilities you need.
OIDC is also preferred when your workforce is mobile-first. When your field sales team uses native iOS apps to access customer data, OIDC can handle the mobile authentication flows far more elegantly than SAML can.
Business advantages of OIDC
Versatility across platforms: OIDC works seamlessly across web, mobile, and API environments, providing consistency in your identity strategy regardless of platform.
Developer productivity: The simpler, more intuitive protocol means faster integration of new applications and services, reducing time-to-market for new initiatives.
Granular control: OIDC's scope-based permissions allow for precise control over what user information applications can access, supporting privacy-by-design principles.
Future-proofing: As organizations adopt more cloud-native and microservices architectures, OIDC provides the flexibility needed to secure these modern patterns.
SCIM: the automated HR system for your applications
SCIM addresses a different but equally critical challenge: keeping user accounts synchronized across your growing ecosystem of applications. Think of SCIM as an automated HR system that works behind the scenes to ensure every application knows about employee changes the moment they happen.
Consider the typical employee lifecycle: hiring, role changes, team transfers, and eventual departure. Without automation, each of these events requires manual account management across potentially dozens of systems. It's a time-consuming process that poses significant security risks through delayed deprovisioning and human error.
SCIM works by establishing standardized communication channels between your source of truth (typically your HR system or IdP) and your target applications. When someone joins your company, SCIM automatically creates their accounts across all integrated systems. When they change roles, permissions are updated instantly. When they leave, accounts are deactivated immediately.
The business case for SCIM
Operational efficiency: SCIM eliminates the manual work of account management, freeing your IT team to focus on strategic initiatives rather than administrative tasks.
Enhanced security: Automated deprovisioning ensures that when employees leave, their access is revoked immediately across all systems. This eliminates the security risk of orphaned accounts and ensures compliance with access management policies.
Improved onboarding experience: New employees can be productive from day one because their accounts and permissions are ready before they even start, rather than waiting for manual provisioning processes.
Cost savings: Beyond labor savings, SCIM reduces the risk of compliance violations and security breaches that can result from manual account management errors.
The provisioning paradox: what SCIM can't touch
SCIM represents a significant leap forward in automating user lifecycle management, but it operates within the same constraints as other identity frameworks. It can only manage applications that support SCIM endpoints and maintain API connectivity with your IdP.
In any organization, there's a shadow ecosystem of applications that exist outside your carefully orchestrated identity management strategy. These disconnected apps accumulate users, permissions, and access rights that SCIM simply cannot touch.
Think contractor accounts in specialized tools that lack SCIM connectors, one-off applications purchased by individual departments without IT involvement, SaaS applications on basic pricing tiers that do not include provisioning APIs, or legacy systems that predate your modern identity infrastructure.
This creates what we call "provisioning blindness"—your automated SCIM workflows are executing perfectly within their scope, but significant portions of your application portfolio remain invisible and unmanaged.
The identity management ecosystem: how it all works together
The true power of modern identity management emerges when SAML, OIDC, and SCIM work together as a cohesive ecosystem. These frameworks are complementary, not competing—each solving different aspects of the identity challenge while sharing context and maintaining security boundaries.
A day in the life of an employee: complete identity integration
Let's follow a new employee through their first day to see how these frameworks collaborate:
Before day one: HR adds the new employee to your HRIS system. SCIM automatically detects this change through API webhooks and creates user accounts across all integrated applications—email, collaboration tools, project management systems, and business applications. The employee's role and department information determines their initial permissions and group memberships.
First login: The employee arrives and logs into their workstation using their corporate credentials. When they access the company intranet portal, SAML creates a secure assertion containing their identity attributes, enabling seamless authentication without exposing the credentials to the application.
Accessing applications: Throughout the day, as they click on various applications from the portal, SAML or OIDC handles transparent SSO depending on the application. The applications receive the necessary user attributes to make authorization decisions without requiring separate logins.
Role changes: Six months later, the employee gets promoted. HR updates their role in the HRIS system, and SCIM automatically adjusts permissions across all connected applications. The employee's new access is available immediately, while unnecessary permissions from their previous role are revoked to maintain least-privilege principles.
Offboarding: When the employee eventually leaves the company, HR marks them as inactive. SCIM immediately deactivates accounts across all systems, ensuring no security gaps while maintaining audit trails for compliance.
While this integrated ecosystem of SAML, OIDC, and SCIM represents the ideal state of identity management, the reality for most organizations is more complex. Understanding these frameworks is essential, but equally important is recognizing where they fall short in practice.
The disconnected app ecosystem: when identity frameworks meet reality
That perfectly orchestrated employee lifecycle we just explored? It works beautifully—for applications that play by the rules. But a growing number of applications simply bypass these frameworks entirely, creating security gaps that traditional identity management cannot address.
The path of least resistance
Here's how it typically happens:
Scenario 1: A marketing team needs a new AI tool for content generation. The tool doesn't support SAML, but they need it immediately to meet campaign deadlines. Their solution? Create individual accounts with corporate email addresses, managed through shared spreadsheets.
Scenario 2: Engineering needs specialized development tools for a critical project. The vendor offers SAML support—but only in an enterprise plan that costs 5X more than the basic plan. Due to budget constraints, the team opts for basic authentication, manually managing access for dozens of developers.
Scenario 3: A contractor requires access to internal systems. Without SCIM support, IT manually creates accounts, hoping they'll remember to disable them when the contract ends.
Scenario 4: The development team is building a customer portal that needs to integrate with modern APIs—payment processors, analytics platforms, and support tools. These services expect OIDC token-based authentication, but your SAML-centric infrastructure would require months of changes to support it. The team creates individual service accounts and API keys instead, bypassing identity management entirely.
Each of these scenarios creates what security experts call "identity debt"—a growing collection of ungoverned accounts that exist outside your carefully designed identity framework.
The compounding challenge
The problem compounds as organizations scale. AI and productivity tools multiply rapidly, often lacking enterprise security features. Department-level software purchases bypass IT's identity requirements. Contractors and temporary workers need access to business-critical systems that don't support your identity standards. And legacy applications essential for operations can't integrate with modern identity frameworks.
What starts as a few tactical exceptions quickly becomes a shadow ecosystem of applications—each with its own credentials, lifecycle management processes, and security risks. Your IdP continues functioning perfectly for integrated applications, while a growing percentage of your actual application portfolio remains invisible to these controls.
The path forward: move from gaps to complete coverage
Identity management will always be a moving target for IT leaders. SAML, OIDC, and SCIM lay the groundwork for strong, automated security—but every organization still faces that unavoidable gap between what's "ideally" integrated and the messy reality of SaaS sprawl, shadow IT, and legacy tools. In practice, the goal shifts from technical perfection to real-world coverage, visibility, and control.
Forward-thinking teams are shifting from the pursuit of perfect automation to demanding complete governance—regardless of what protocols each app supports. That means extending your security and compliance posture across your entire application landscape, not just the ones that play nicely with your IdP.
That's where modern SaaS management platforms like Stitchflow come in: working alongside your existing IdP to discover orphaned accounts, automate remediation workflows, and maintain governance across both connected and disconnected applications.
In the end, effective identity management is about making sure every door is locked, every account is monitored, and no app is left behind. If you're curious what's hiding in your own blind spots—and how others are bridging this gap—now is the time to take a fresh look at your full identity landscape.
Frequently asked questions
SAML (Security Assertion Markup Language) handles secure authentication and single sign-on for traditional, web-based enterprise apps. OIDC (OpenID Connect) is a modern, API-friendly authentication protocol built for mobile, cloud, and microservices environments. SCIM (System for Cross-domain Identity Management) is a provisioning standard that automates user account creation, updates, and deactivation across systems. Together, they cover authentication, authorization, and account lifecycle management.
Use SAML when integrating with mature enterprise SaaS platforms (e.g., Salesforce, Workday) or legacy applications that require XML-based assertions and detailed audit logging. Use OIDC when supporting mobile apps, APIs, or modern web applications that require JSON-based tokens, fine-grained permissions, and faster developer integration. Many organizations use both, depending on their application mix.
SCIM automates the process of creating, updating, and removing user accounts across integrated applications. It reduces manual IT work, speeds up onboarding, prevents "ghost accounts" after offboarding, and ensures permissions remain accurate when roles change. This strengthens security while cutting operational costs.
These protocols only work with applications that support them. Many tools—especially lower-tier SaaS plans, niche apps, or legacy systems—lack native support, creating "disconnected apps" that bypass identity provider controls. This leaves blind spots in authentication, authorization, and provisioning workflows.
Closing these gaps requires visibility into all SaaS usage, not just IdP-connected apps. Modern SaaS management platforms (like Stitchflow) complement your IdP by discovering unmanaged accounts, highlighting compliance risks, and automating remediation for both connected and disconnected applications.
Sanjeev NC started his career in IT service desk and moved to ITSM process consulting, where he has led award-winning ITSM tool implementations. Sanjeev was also a highly commended finalist for Young ITSM Professional of the Year in itSMF UK’s annual awards.