Security Guide > SAML Authentication for Informatica Web Applications > SAML Authentication Overview
  

SAML Authentication Overview

You can configure Security Assertion Markup Language (SAML) authentication for Informatica web applications.
Security Assertion Markup Language is an XML-based data format for exchanging authentication information between a service provider and an identity provider. In an Informatica domain, the Informatica web application is the service provider.
You can configure the following Informatica web applications to use SAML authentication:
Note: SAML authentication cannot be used in an Informatica domain configured to use Kerberos authentication.
If you enable a domain to use SAML authentication, all web applications that run in the domain use the identity provider you configure in the domain by default. However, you can configure web applications that run in a domain to use different identity providers. For example, you might configure Informatica Administrator to use AD FS as the identity provider, and configure Informatica Analyst to use PingFederate as the identity provider.
For more information about configuring web applications to use different identity providers, see Configuring Web Applications to Use Different Identity Providers.

Default Keystore and Truststore Directory

The Informatica deployment includes default keystore and truststore files in the directory <Informatica installation directory>\services\shared\security.
Informatica recommends that you use the default keystore and truststore only for setup and proof-of-concept use cases. To secure a production environment, use the following guidelines:

Supported Identity Providers

Use a supported identity provider to manage SAML authentication on the domain for web applications.
Informatica supports the following identity providers. Click the How-to Library (H2L) article link to get instructions for integration between each identity provider and the domain.
Identity Provider
How-to Library (H2L) article
Microsoft Active Directory Federation Services (AD FS)
PingFederate
F5 Big-IP
NetScaler
Oracle Access Manager (OAM)
Okta SSO
Azure Active Directory
For information about supported versions of these identity providers, see the Product Availability Matrix on Informatica Network: https://network.informatica.com/community/informatica-network/product-availability-matrices.