<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: BoxyHQ</title>
    <description>The latest articles on DEV Community by BoxyHQ (@boxyhq).</description>
    <link>https://dev.to/boxyhq</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F5826%2F71f44b36-852b-41ea-80a9-2dd7ccd75c9d.png</url>
      <title>DEV Community: BoxyHQ</title>
      <link>https://dev.to/boxyhq</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/boxyhq"/>
    <language>en</language>
    <item>
      <title>7 Frameworks, One SAML Jackson - Your Open Source Single Sign-On Solution</title>
      <dc:creator>Schalk Neethling</dc:creator>
      <pubDate>Thu, 04 Apr 2024 00:12:18 +0000</pubDate>
      <link>https://dev.to/boxyhq/7-frameworks-one-saml-jackson-your-open-source-single-sign-on-solution-3cdf</link>
      <guid>https://dev.to/boxyhq/7-frameworks-one-saml-jackson-your-open-source-single-sign-on-solution-3cdf</guid>
      <description>&lt;p&gt;Many SaaS founders building services for the business-to-business (B2B) industry will quickly encounter the need to offer &lt;a href="https://boxyhq.com/enterprise-sso" rel="noopener noreferrer"&gt;single sign-on&lt;/a&gt; as part of their SaaS offerings or risk losing out on lucrative enterprise sales. While there are quite a few providers in this space, there are very few with the flexibility and ease of adoption of &lt;a href="https://github.com/boxyhq/jackson" rel="noopener noreferrer"&gt;BoxyHQ's SAML Jackson&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Two of the core strengths of any open-source project are the quality of its documentation and a helpful and supportive community. You will be delighted to learn that BoxyHQ has got you covered on both of these fronts. From the &lt;a href="https://github.com/boxyhq/jackson" rel="noopener noreferrer"&gt;clearly written README&lt;/a&gt; that gets SAML Jackson running locally in no time, to &lt;a href="https://boxyhq.com/guides" rel="noopener noreferrer"&gt;detailed guides&lt;/a&gt; demonstrating how to integrate SAML Jackson into your application, and a &lt;a href="https://discord.boxyhq.com/" rel="noopener noreferrer"&gt;supportive community&lt;/a&gt;, you are in good hands.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Did you know?&lt;/strong&gt; Most enterprises rely on SAML-based single sign-on (SSO). But what is SAML? &lt;a href="https://dev.to/schalkneethling/what-is-saml-and-why-you-should-care-4anp"&gt;Learn more in this post&lt;/a&gt;.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  The Guides
&lt;/h2&gt;

&lt;p&gt;In the JavaScript ecosystem, there are guides for enabling SAML-based enterprise single sign-on in &lt;a href="https://adonisjs.com/" rel="noopener noreferrer"&gt;AdonisJS&lt;/a&gt;, &lt;a href="http://expressjs.com/" rel="noopener noreferrer"&gt;Express.js&lt;/a&gt;, &lt;a href="https://nextjs.org/" rel="noopener noreferrer"&gt;Next.js&lt;/a&gt;, &lt;a href="https://remix.run/" rel="noopener noreferrer"&gt;Remix&lt;/a&gt;, and &lt;a href="https://react.dev/" rel="noopener noreferrer"&gt;React&lt;/a&gt; with an Express.js backend.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://boxyhq.com/guides/jackson/frameworks/adonis" rel="noopener noreferrer"&gt;SAML Jackson AdonisJS guide&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://boxyhq.com/guides/jackson/frameworks/express" rel="noopener noreferrer"&gt;SAML Jackson Express.js guide&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://boxyhq.com/guides/jackson/frameworks/nextjs" rel="noopener noreferrer"&gt;SAML Jackson Next.js guide&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://boxyhq.com/guides/jackson/frameworks/react" rel="noopener noreferrer"&gt;SAML Jackson React guide&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://boxyhq.com/guides/jackson/frameworks/remix" rel="noopener noreferrer"&gt;SAML Jackson Remix guide&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Each guide follows a similar outline with some additional steps detailed where needed.&lt;/p&gt;

&lt;h3&gt;
  
  
  Configure SAML Single Sign-On
&lt;/h3&gt;

&lt;p&gt;This section features two guides that help you understand everything you need to know about configuring SAML single sign-on. The first guide assists you in &lt;a href="https://boxyhq.com/guides/jackson/configuring-saml-sso" rel="noopener noreferrer"&gt;configuring SAML SSO&lt;/a&gt; and the second covers the &lt;a href="https://boxyhq.com/docs/jackson/sso-flow" rel="noopener noreferrer"&gt;SSO Connection API&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;
  
  
  Authenticate with SAML Single Sign-On
&lt;/h3&gt;

&lt;p&gt;The authentication portion of the guides follows a similar seven-step process, with some of the guides requiring additional steps.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Install SAML Jackson&lt;/li&gt;
&lt;li&gt;Setup SAML Jackson&lt;/li&gt;
&lt;li&gt;Make an Authentication Request&lt;/li&gt;
&lt;li&gt;Receives SAML Response&lt;/li&gt;
&lt;li&gt;Request Access Token&lt;/li&gt;
&lt;li&gt;Fetch User Profile&lt;/li&gt;
&lt;li&gt;Authenticate User&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Some guides require you to run SAML Jackson as a service. In these cases, you can either:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Run it locally by following the &lt;a href="https://github.com/boxyhq/jackson?tab=readme-ov-file#deploying-saml-jackson-as-a-separate-service-locally" rel="noopener noreferrer"&gt;setup guide in the project README&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Deploy an instance &lt;a href="https://boxyhq.com/guides/jackson/deployments/vercel" rel="noopener noreferrer"&gt;using Vercel&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Deploy an instance &lt;a href="https://boxyhq.com/guides/jackson/deployments/heroku" rel="noopener noreferrer"&gt;using Heroku&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Question:&lt;/strong&gt; What other deployment targets would you like to see? Let us know in the comments.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;For some people, there is nothing like "view source". If this is you, you will be happy to know that for each of these frameworks there exists a sample implementation (&lt;a href="https://github.com/boxyhq/jackson-examples/" rel="noopener noreferrer"&gt;jackson-examples repo&lt;/a&gt;):&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/boxyhq/jackson-examples/tree/main/apps/adonisjs" rel="noopener noreferrer"&gt;AdonisJS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/boxyhq/jackson-examples/tree/main/apps/express" rel="noopener noreferrer"&gt;ExpressJS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;For Next.js there is &lt;a href="https://github.com/boxyhq/jackson-examples/tree/main/apps/next-auth" rel="noopener noreferrer"&gt;this sample application&lt;/a&gt;, and you can also look at the &lt;a href="https://github.com/boxyhq/saas-starter-kit" rel="noopener noreferrer"&gt;BoxyHQ Enterprise SaaS starter kit&lt;/a&gt; for a complete implementation example.&lt;/li&gt;
&lt;li&gt;For React there is &lt;a href="https://github.com/boxyhq/jackson-examples/tree/main/apps/react-example" rel="noopener noreferrer"&gt;an example application&lt;/a&gt; and an example of the backend &lt;a href="https://github.com/boxyhq/jackson-examples/tree/main/apps/express-api" rel="noopener noreferrer"&gt;Express API&lt;/a&gt; referenced in the guide.&lt;/li&gt;
&lt;li&gt;The Remix guide is one of the guides that is quite different and has it's &lt;a href="https://github.com/boxyhq/jackson-remix-auth" rel="noopener noreferrer"&gt;own repo containing an example implementation&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Question:&lt;/strong&gt; Is your chosen framework missing from the list? Let us know in the comments which frameworks we should cover next.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Using Laravel or Ruby on Rails? We have not forgotten about you. As with the JavaScript frameworks above, we have you covered with guides and sample implementations.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://boxyhq.com/guides/jackson/frameworks/laravel" rel="noopener noreferrer"&gt;SAML Jackson Laravel guide&lt;/a&gt; and &lt;a href="https://github.com/boxyhq/php-examples/tree/main/laravel-enterprise-sso" rel="noopener noreferrer"&gt;sample app&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://boxyhq.com/guides/jackson/frameworks/rails" rel="noopener noreferrer"&gt;SAML Jackson Ruby on Rails guide&lt;/a&gt; and &lt;a href="https://github.com/boxyhq/ruby-examples/tree/main/rails-enterprise-sso" rel="noopener noreferrer"&gt;sample app&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Question:&lt;/strong&gt; As with the JavaScript frameworks, let us know in the comments which frameworks we should cover next.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;With these guides, sample applications, and the supportive community there is no need to put off adding single sign-on to your SaaS application today.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;NOTE:&lt;/strong&gt; Because everything mentioned here is open-source we welcome your contributions to make what we have today even better.&lt;/p&gt;
&lt;/blockquote&gt;




&lt;p&gt;Stop by &lt;a href="https://github.com/boxyhq" rel="noopener noreferrer"&gt;BoxyHQ's home on GitHub&lt;/a&gt; and share some love and appreciation by adding a star to the powerhouse behind this, &lt;a href="https://github.com/boxyhq/jackson" rel="noopener noreferrer"&gt;SAML Jackson&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>opensource</category>
      <category>javascript</category>
      <category>security</category>
    </item>
    <item>
      <title>A Secure, Privacy-First AI-driven Data Collection Platform: BlockSurvey</title>
      <dc:creator>Schalk Neethling</dc:creator>
      <pubDate>Wed, 13 Mar 2024 13:48:15 +0000</pubDate>
      <link>https://dev.to/boxyhq/a-secure-privacy-first-ai-driven-data-collection-platform-blocksurvey-4mdd</link>
      <guid>https://dev.to/boxyhq/a-secure-privacy-first-ai-driven-data-collection-platform-blocksurvey-4mdd</guid>
      <description>&lt;p&gt;&lt;a href="https://blocksurvey.io" rel="noopener noreferrer"&gt;BlockSurvey&lt;/a&gt;, is a pioneering decentralized AI-driven data collection platform, designed with the core mission of enhancing privacy and security in the digital data collection process. By leveraging cutting-edge blockchain technology, BlockSurvey empowers both individuals and organizations to gather and disseminate information via forms and surveys in an environment where confidentiality and data protection are paramount. This innovative approach not only safeguards the respondents' privacy but also ensures the integrity of the data collected.&lt;/p&gt;

&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;In a world where data privacy has become a paramount concern, BlockSurvey stands out as a beacon of trust and security. Committed to empowering users with complete ownership over their data, BlockSurvey faced the challenge of ensuring enterprise-level security and privacy for its customers.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The solution?&lt;/strong&gt; BoxyHQ’s Single Sign-On powered by the open-source &lt;a href="https://github.com/boxyhq/jackson" rel="noopener noreferrer"&gt;SAML Jackson&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Challenge
&lt;/h2&gt;

&lt;p&gt;At the heart of BlockSurvey's mission is the promise of unparalleled data privacy and security. But with great promise comes the challenge of implementation, especially as BlockSurvey sought to expand its offerings to enterprise clients. They needed a robust SSO solution that not only streamlined access management but also reinforced their commitment to privacy and security.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Solution
&lt;/h2&gt;

&lt;p&gt;BoxyHQ emerged as the perfect partner in this journey. With its open-source SSO solution, BoxyHQ offered the flexibility, ease of integration, and, most importantly, the security assurance BlockSurvey was seeking. The decision to collaborate with BoxyHQ was driven by a shared vision for privacy and security, making BoxyHQ's SAML Jackson the cornerstone of BlockSurvey's enterprise security framework.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Impact
&lt;/h2&gt;

&lt;p&gt;The integration of BoxyHQ's SSO solution transformed BlockSurvey's operational and security landscape. Not only did it enhance user experience by streamlining the login process, but it also significantly bolstered client confidence. The direct benefits were immediate: a seamless, secure, and efficient login experience for users across the board.&lt;/p&gt;

&lt;p&gt;But the ripple effects went deeper. As noted by Raja Ilayaperumal, Co-Founder and CTO of BlockSurvey, "With our inaugural client already onboarded, we're thrilled by the positive reception. We anticipate a substantial and lasting impact on our business in the long run." This partnership has paved the way for BlockSurvey to onboard enterprise clients more effectively, marking a significant milestone in their growth journey.&lt;/p&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;The collaboration between BlockSurvey and BoxyHQ is more than just a technical integration; it's a partnership that enhances the very essence of privacy and security in digital data collection platforms. By leveraging BoxyHQ's expertise in enterprise single sign-on (SSO), BlockSurvey is not only able to offer a superior product but also reinforce its commitment to data privacy and security, ensuring a safer digital space for all users.&lt;/p&gt;

&lt;p&gt;Discover how BoxyHQ can empower your business with secure, scalable, and user-friendly SSO solutions. Read more about our &lt;a href="https://boxyhq.com/enterprise-sso" rel="noopener noreferrer"&gt;Enterprise SSO&lt;/a&gt; offerings and how we can help elevate your security standards.&lt;/p&gt;

</description>
      <category>successstory</category>
      <category>security</category>
      <category>enterprise</category>
      <category>api</category>
    </item>
    <item>
      <title>SSO vs. Identity Federation: Optimizing Authentication for Modern Enterprises</title>
      <dc:creator>Sama</dc:creator>
      <pubDate>Tue, 27 Feb 2024 20:04:48 +0000</pubDate>
      <link>https://dev.to/boxyhq/sso-vs-identity-federation-optimizing-authentication-for-modern-enterprises-47ak</link>
      <guid>https://dev.to/boxyhq/sso-vs-identity-federation-optimizing-authentication-for-modern-enterprises-47ak</guid>
      <description>&lt;p&gt;In today's interconnected digital ecosystem, businesses are constantly seeking efficient and secure solutions to manage user authentication across multiple applications and domains. Identity Federation and Single Sign-On (SSO) stand out as two prominent approaches, each offering distinct advantages and use cases. Let's explore the differences between Identity Federation and SSO, their benefits, and how they address the evolving needs of enterprises.&lt;/p&gt;

&lt;h2&gt;
  
  
  Single Sign-On (SSO): Simplifying Access, Enhancing Security
&lt;/h2&gt;

&lt;p&gt;Single Sign-On (SSO) revolutionizes the user authentication experience by enabling users to access multiple applications with a single set of credentials. Whether it's employees navigating various internal tools or customers interacting with diverse services, SSO streamlines login processes, enhances productivity, and bolsters security. Key features of SSO include:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Seamless Access:&lt;/strong&gt; Users enjoy a frictionless login experience, eliminating the need to remember and enter multiple passwords for different applications.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Enhanced Security:&lt;/strong&gt; By reducing the number of credentials users manage, SSO mitigates the risk of password-related vulnerabilities and unauthorized access.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Improved User Experience:&lt;/strong&gt; SSO fosters a seamless and intuitive login process, boosting user satisfaction and productivity.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cost Savings:&lt;/strong&gt; Organizations benefit from reduced IT support costs associated with password management and help desk inquiries.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Identity Federation (FIM): Extending Access Across Boundaries
&lt;/h2&gt;

&lt;p&gt;Identity Federation expands upon the capabilities of SSO by facilitating seamless authentication across organizational boundaries and disparate domains. By establishing trusted relationships between entities, Identity Federation enables users to authenticate once and access resources across multiple organizations or service providers. Key features of Identity Federation include:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Cross-Domain Authentication:&lt;/strong&gt; Users can seamlessly access resources across different organizational boundaries without the need for separate authentication processes.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Interoperability:&lt;/strong&gt; Identity Federation leverages standard protocols like SAML, OAuth, and OpenID Connect to ensure interoperability and secure identity exchange between domains.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Enhanced Collaboration:&lt;/strong&gt; By enabling seamless access to external applications and resources, Identity Federation fosters collaboration, partnerships, and innovation across organizations.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Scalability and Flexibility:&lt;/strong&gt; Identity Federation accommodates the dynamic needs of modern enterprises, supporting remote work, cloud-based services, and distributed teams.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5nwwxrlcq32gqu4oq1ny.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5nwwxrlcq32gqu4oq1ny.png" alt="Illustration of Single Sign-On and Identity Federation process with five icons representing a user, secure cloud, sync, email, and computer." width="800" height="582"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Identity Providers (IdPs): The Backbone of Identity Federation
&lt;/h2&gt;

&lt;p&gt;Central to Identity Federation is the concept of Identity Providers (IdPs). IdPs serve as the authoritative source for user authentication and identity verification. They establish trusted relationships with Service Providers (SPs) to enable seamless authentication and access to resources across different domains. IdPs play a crucial role in ensuring the security, interoperability, and scalability of Identity Federation solutions.&lt;/p&gt;

&lt;h2&gt;
  
  
  Choosing the Right Solution
&lt;/h2&gt;

&lt;p&gt;When selecting between Identity Federation and Single Sign-On, enterprises should consider their specific requirements, security posture, and scalability needs. While SSO excels in simplifying access within organizational boundaries, Identity Federation extends authentication capabilities across domains, supporting collaboration and partnership initiatives. By implementing a comprehensive authentication strategy that leverages both SSO and Identity Federation, enterprises can optimize security, productivity, and user experience in today's digital landscape.&lt;/p&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;In the realm of user authentication, Identity Federation and Single Sign-On represent two powerful approaches for simplifying access, enhancing security, and fostering collaboration. By understanding the nuances of each solution and aligning them with organizational goals, enterprises can navigate the complexities of modern authentication challenges and unlock new opportunities for innovation and growth. Whether it's streamlining internal workflows or facilitating external partnerships, Identity Federation and Single Sign-On are indispensable tools in the arsenal of today's digital enterprises.&lt;/p&gt;

</description>
      <category>enterprisesecurity</category>
      <category>authentication</category>
      <category>security</category>
      <category>developer</category>
    </item>
    <item>
      <title>BoxyHQ + Cerbos: Merging SSO and Authorization</title>
      <dc:creator>Kiran Krishnan</dc:creator>
      <pubDate>Mon, 24 Jul 2023 00:00:00 +0000</pubDate>
      <link>https://dev.to/boxyhq/boxyhq-cerbos-merging-sso-and-authorization-o01</link>
      <guid>https://dev.to/boxyhq/boxyhq-cerbos-merging-sso-and-authorization-o01</guid>
      <description>&lt;p&gt;In this article, we will see how to enable Enterprise SSO login (based on the SAML single sign-on protocol) using Okta for your Next.js app and relay role-based access directly from the Identity Provider to Cerbos.&lt;/p&gt;

&lt;p&gt;We'll be using BoxyHQ's open-source &lt;a href="https://dev.to/enterprise-sso"&gt;Enterprise SSO&lt;/a&gt; solution (called SAML Jackson) to interface with Okta. We'll use the principle of minimal UI and include only the necessary interface in our example application.&lt;/p&gt;

&lt;h2&gt;
  
  
  Introduction to SAML single sign-on​
&lt;/h2&gt;

&lt;p&gt;Security Assertion Markup Language (SAML) was designed for traditional web applications in the early 2000s. The goal was to provide a seamless user experience for applications by federating authentication to an IdP.&lt;/p&gt;

&lt;p&gt;As a result, applications no longer had to maintain identities for users. All they had to do was to redirect the browser to the IdP which would then authenticate the user and return an assertion about the logged-in user.&lt;/p&gt;

&lt;p&gt;This assertion in effect was a token, asserting to the app that the user authenticated at the IdP and the assertion is valid for the set period contained within it. You can read more about SAML and other SSO protocols here.&lt;/p&gt;

&lt;p&gt;SAML continues to be a very popular choice of protocol when there's a need to provide a single sign-on (SSO) experience for an enterprise application. Microsoft has great resources explaining SAML authentication and SAML at a deeper level.&lt;/p&gt;

&lt;h2&gt;
  
  
  Benefits of using SAML​
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Increased Security​
&lt;/h3&gt;

&lt;p&gt;SAML is at its heart a security standard and as it provides a single point of authentication that takes place in a secure environment it adds an extra layer of security to your service that most enterprise customers will ask for.&lt;/p&gt;

&lt;h3&gt;
  
  
  Improved user experience​
&lt;/h3&gt;

&lt;p&gt;As a user, SAML is very simple and pleasant to use as you only have to log in once and then you can access all your external services on a dashboard with a single click. This saves the user time and makes their overall experience of your product better.&lt;/p&gt;

&lt;h3&gt;
  
  
  Reduces cost​
&lt;/h3&gt;

&lt;p&gt;Without SAML you have to maintain account information across multiple services but when you use SAML this is all managed by the IdP.&lt;/p&gt;

&lt;h2&gt;
  
  
  Introduction to BoxyHQ​
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://boxyhq.com/" rel="noopener noreferrer"&gt;BoxyHQ&lt;/a&gt; implements and maintains an open-source project that handles all the service provider functionality for implementing SAML, hiding away all the complexity you read about above behind the more popular and well-understood OAuth 2.0 protocol.&lt;/p&gt;

&lt;h2&gt;
  
  
  Introduction to Cerbos​
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://cerbos.dev/" rel="noopener noreferrer"&gt;Cerbos&lt;/a&gt; is the open-core, language-agnostic, scalable authorization solution that makes user permissions and authorization simple to implement and manage by writing context-aware access control policies for your application resources.&lt;/p&gt;

&lt;p&gt;In this tutorial, we are using BoxyHQ as the service provider layer between our example Next.js application and Okta as the Identity Provider to showcase the benefits of syncing roles and permissions during SSO login.&lt;/p&gt;

&lt;h2&gt;
  
  
  Overview of the example app​
&lt;/h2&gt;

&lt;p&gt;The example app is a simple Next.js app that uses &lt;a href="https://boxyhq.com/docs/jackson/overview" rel="noopener noreferrer"&gt;SAML Jackson for SAML SSO&lt;/a&gt; authentication and &lt;a href="https://docs.cerbos.dev/cerbos/latest/quickstart.html" rel="noopener noreferrer"&gt;Cerbos for authorization&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;The app has two pages:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;/&lt;/code&gt; - Display the authenticated user's profile and authorization decisions returned by Cerbos API.&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;/saml-connection&lt;/code&gt; - Update the SAML connection details.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The example app runs on port &lt;code&gt;3000&lt;/code&gt;. SAML Jackson and Cerbos are running on ports &lt;code&gt;5225&lt;/code&gt; and &lt;code&gt;3593&lt;/code&gt; respectively within Docker containers.&lt;/p&gt;

&lt;p&gt;You are free to use cloud versions of Cerbos, the instructions for those wouldn’t change a lot but have been avoided in this article to keep it short.&lt;/p&gt;

&lt;p&gt;The example app is configured to work with 2 roles: &lt;code&gt;app-admin&lt;/code&gt; and &lt;code&gt;app-user&lt;/code&gt;.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The &lt;code&gt;app-admin&lt;/code&gt; role has access to all resources.&lt;/li&gt;
&lt;li&gt;The &lt;code&gt;app-user&lt;/code&gt; role has access to resources only the user owns.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Take a look at the &lt;code&gt;cerbos/policies/contact.yaml&lt;/code&gt; file to see how the policies are defined for the example app. You can try changing the policies and see how the authorization decisions change in the app.&lt;/p&gt;

&lt;p&gt;The following diagram shows the architecture of the example app.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjdvmrbf5ksothxa2s86w.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjdvmrbf5ksothxa2s86w.png" alt="example app architecture" width="800" height="399"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  1. Setup the example app​
&lt;/h3&gt;

&lt;p&gt;Clone the example app repository:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;git clone https://github.com/boxyhq/jackson-cerbos
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;p&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;Navigate to the example app directory and run &lt;code&gt;npm install&lt;/code&gt; to install the dependencies.&lt;br&gt;
&lt;/p&gt;
&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;cd jackson-cerbos
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;p&gt;&lt;span&gt;&lt;/span&gt;&lt;br&gt;
&lt;/p&gt;
&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;npm install
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;p&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;If you navigate to &lt;code&gt;http://localhost:3000&lt;/code&gt; on your browser, you should see the following page.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi3olowlm1qnvdninwa7c.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi3olowlm1qnvdninwa7c.png" alt="example app home" width="800" height="340"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This would mean that the example app is running successfully and you can now proceed to the next step.&lt;/p&gt;

&lt;p&gt;The &lt;a href="https://github.com/boxyhq/jackson-cerbos/blob/main/README.md" rel="noopener noreferrer"&gt;README&lt;/a&gt; file repository has all details about the example app. You can refer to it if you have anything unclear in this article.&lt;/p&gt;
&lt;h3&gt;
  
  
  2. Setup SAML App in Okta​
&lt;/h3&gt;

&lt;p&gt;The next step is to set up a SAML app in Okta. If you don't have an Okta account, you can create a free developer account &lt;a href="https://developer.okta.com/signup/" rel="noopener noreferrer"&gt;https://developer.okta.com/signup/&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Alternatively, you can also use other SAML IdPs like Azure AD, OneLogin, Auth0, etc. The steps for those would be similar to the ones for Okta.&lt;/p&gt;

&lt;p&gt;In this article, we will use Okta as the IdP.&lt;/p&gt;

&lt;p&gt;If you are unfamiliar with creating a SAML app in Okta, you can follow the instructions &lt;a href="https://boxyhq.com/docs/jackson/sso-providers/okta" rel="noopener noreferrer"&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;You will want to use the &lt;strong&gt;Assertion Consumer Service URL&lt;/strong&gt; and &lt;strong&gt;Entity ID&lt;/strong&gt; from &lt;a href="http://localhost:5225/.well-known/saml-configuration" rel="noopener noreferrer"&gt;http://localhost:5225/.well-known/saml-configuration&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Do not worry about the roles attribute yet, we’ll configure that in a later step once we have ensured the SSO login flow works correctly.&lt;/p&gt;

&lt;p&gt;Next, download the &lt;strong&gt;SAML Metadata XML file&lt;/strong&gt; from the Okta app. You will need this file in the next step.&lt;/p&gt;
&lt;h3&gt;
  
  
  3. Create a SAML connection in SAML Jackson​
&lt;/h3&gt;

&lt;p&gt;Now that we have the SAML app setup in Okta, we need to create a SAML connection in SAML Jackson.&lt;/p&gt;

&lt;p&gt;Navigate to &lt;a href="http://localhost:3000/saml-connection" rel="noopener noreferrer"&gt;http://localhost:3000/saml-connection&lt;/a&gt; on your browser and paste the contents of the SAML Metadata XML file you downloaded in the previous step in the &lt;strong&gt;XML Metadata&lt;/strong&gt; field. Click on &lt;strong&gt;Create SAML Connection&lt;/strong&gt; to create the SAML connection.&lt;/p&gt;

&lt;p&gt;If you see the status &lt;strong&gt;SAML SSO Enabled&lt;/strong&gt; on the page, it means that the SAML connection was created successfully.&lt;/p&gt;
&lt;h3&gt;
  
  
  4. Login with SAML SSO​
&lt;/h3&gt;

&lt;p&gt;Now that we have the SAML connection setup, we can try logging in with SAML SSO.&lt;/p&gt;

&lt;p&gt;Navigate to &lt;a href="http://localhost:3000/login" rel="noopener noreferrer"&gt;http://localhost:3000/login&lt;/a&gt; on your browser, enter the email address and click on &lt;strong&gt;Continue with SAML SSO&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;You will be redirected to the Okta login page. Enter the credentials and click on &lt;strong&gt;Sign In&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;You will be redirected back to the home page of the example app and you should see the Profile of the authenticated user.&lt;/p&gt;

&lt;p&gt;This means that you have successfully logged in with SAML SSO.&lt;/p&gt;

&lt;p&gt;Since we haven't configured the roles attribute yet, all the users will be assigned the &lt;strong&gt;app-user&lt;/strong&gt; role by default.&lt;/p&gt;
&lt;h3&gt;
  
  
  5. Configure the groups attribute in Okta App​
&lt;/h3&gt;

&lt;p&gt;Now that we have ensured that the SSO login flow works correctly, we can configure the groups attribute in Okta.&lt;/p&gt;

&lt;p&gt;Groups attribute allows you to map the groups in your identity provider to the roles in your application.&lt;/p&gt;
&lt;h4&gt;
  
  
  Create a group in Okta​
&lt;/h4&gt;

&lt;p&gt;First, we need to create a group in Okta. Navigate to the Directory &amp;gt; Groups from the left navigation menu.&lt;/p&gt;

&lt;p&gt;Click on &lt;strong&gt;Add group&lt;/strong&gt; and enter the group &lt;strong&gt;name&lt;/strong&gt; and &lt;strong&gt;description (optional)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Next create two new groups: &lt;strong&gt;app-admin&lt;/strong&gt; and &lt;strong&gt;app-user&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjiv80v5wbymx0xqzk0h7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjiv80v5wbymx0xqzk0h7.png" alt="create okta group" width="800" height="404"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After creating the groups, you will see the groups listed in the Groups page.&lt;/p&gt;

&lt;p&gt;Next we need to add the users to the groups. Navigate to the group you just created and click on the &lt;strong&gt;People&lt;/strong&gt; tab.&lt;/p&gt;

&lt;p&gt;Click on the &lt;strong&gt;Assign people&lt;/strong&gt; button and assign the users you want to add to the group.&lt;/p&gt;

&lt;p&gt;Repeat the same steps for the second group.Configure the groups attribute in Okta&lt;/p&gt;

&lt;p&gt;Now that we have created the groups in Okta, we need to configure the groups attribute in Okta.&lt;/p&gt;

&lt;p&gt;Navigate to the &lt;strong&gt;SAML Settings&lt;/strong&gt; tab in the Okta app and click on &lt;strong&gt;Edit&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Now click on the &lt;strong&gt;Configure SAML&lt;/strong&gt; tab and scroll down to the &lt;strong&gt;Group Attribute Statements&lt;/strong&gt; section.&lt;/p&gt;

&lt;p&gt;Click on &lt;strong&gt;Add Another&lt;/strong&gt; and enter the following values&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Name: groups&lt;/li&gt;
&lt;li&gt;Name format: Unspecified&lt;/li&gt;
&lt;li&gt;Filter: Starts with &lt;strong&gt;app-&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fob7vuyidtobg5nvdi52z.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fob7vuyidtobg5nvdi52z.png" alt="okta group statements" width="800" height="404"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Note the &lt;strong&gt;app-&lt;/strong&gt; prefix in the filter. This will ensure that only the groups that start with &lt;strong&gt;app-&lt;/strong&gt; are returned in the SAML response from Okta. So if you have other groups in Okta, they will not be returned in the SAML response. This is useful if you want to map only a subset of the groups in Okta to the roles in your application.&lt;/p&gt;

&lt;p&gt;There are also other filter options available in the Group Attribute Statements section. You can read more about them in the Okta documentation.&lt;/p&gt;
&lt;h3&gt;
  
  
  6. Test the authorization​
&lt;/h3&gt;

&lt;p&gt;Now that we have configured the &lt;strong&gt;group&lt;/strong&gt; attribute, we can test the authorization.&lt;/p&gt;

&lt;p&gt;Navigate to &lt;a href="http://localhost:3000/" rel="noopener noreferrer"&gt;http://localhost:3000&lt;/a&gt; on your browser and click the &lt;strong&gt;Sign Out&lt;/strong&gt; button.&lt;/p&gt;

&lt;p&gt;Let's try logging in with a user that has the &lt;strong&gt;app-admin&lt;/strong&gt; role.&lt;/p&gt;

&lt;p&gt;You will be redirected to the Okta login page. Enter the credentials and click on &lt;strong&gt;Sign In&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;You will be redirected back to the home page of the example app and you should see the Profile of the authenticated user.&lt;/p&gt;
&lt;h4&gt;
  
  
  Access API authorized by Cerbos​
&lt;/h4&gt;

&lt;p&gt;In the &lt;strong&gt;Access API authorized by Cerbos&lt;/strong&gt; section, we've added a table to display Cerbos authorization decisions for the authenticated user for the resources in the example app.&lt;/p&gt;

&lt;p&gt;Here is the overview of the policies defined in the &lt;code&gt;cerbos/policies/contact.yaml&lt;/code&gt; file.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A user with the &lt;strong&gt;app-admin&lt;/strong&gt; role can perform all actions on all resources.&lt;/li&gt;
&lt;li&gt;A user with the &lt;strong&gt;app-user&lt;/strong&gt; role can perform read and update actions on resources they own.
&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;resourcePolicy: version: default resource: contact rules: - actions: ['read', 'create', 'update', 'delete'] effect: EFFECT_ALLOW roles: - app-admin - actions: ['read', 'update'] effect: EFFECT_ALLOW roles: - app-user condition: match: expr: request.resource.attr.author == request.principal.id
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;p&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h4&gt;
  
  
  Guarded Routes​
&lt;/h4&gt;

&lt;p&gt;In the Guarded Routes section at the bottom of the page, we've added 3 routes to showcase how Cerbos can be used to guard routes in your application.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Route the &lt;em&gt;Admin user role can access&lt;/em&gt;: Can be accessed by the user with the app-admin role.&lt;/li&gt;
&lt;li&gt;Route the &lt;em&gt;User and Admin user roles can access&lt;/em&gt;: Can be accessed by the user with the app-user or app-admin role.&lt;/li&gt;
&lt;li&gt;Route the &lt;em&gt;User does not have access to&lt;/em&gt;: Can be accessed by the user who owns the resource.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;
  
  
  Closing thoughts​
&lt;/h2&gt;

&lt;p&gt;In this article, we have seen how to integrate SAML SSO with Jackson and Cerbos. We have implemented authentication and authorization using SAML SSO, Jackson and Cerbos.&lt;/p&gt;

&lt;p&gt;This opens up whole new possibilities for enterprise apps using Jackson and Cerbos. I’d love to hear of all the cool apps and features you are going to build, please reach out to Jackson or Cerbos if you found this article useful.&lt;/p&gt;

&lt;p&gt;Access the source code for this article here: &lt;a href="https://github.com/boxyhq/jackson-cerbos" rel="noopener noreferrer"&gt;https://github.com/boxyhq/jackson-cerbos&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;
  
  
  Learn More​
&lt;/h2&gt;

&lt;p&gt;To learn more about SAML Jackson and Cerbos, take a look at the following resources:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://boxyhq.com/" rel="noopener noreferrer"&gt;BoxyHQ Website&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cerbos.dev/" rel="noopener noreferrer"&gt;Cerbos Website&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://boxyhq.com/docs/jackson/overview" rel="noopener noreferrer"&gt;SAML Jackson Documentation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.cerbos.dev/cerbos/latest/index.html" rel="noopener noreferrer"&gt;Cerbos Documentation&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;


&lt;div class="ltag-github-readme-tag"&gt;
  &lt;div class="readme-overview"&gt;
    &lt;h2&gt;
      &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fassets.dev.to%2Fassets%2Fgithub-logo-5a155e1f9a670af7944dd5e12375bc76ed542ea80224905ecaf878b9157cdefc.svg" alt="GitHub logo"&gt;
      &lt;a href="https://github.com/boxyhq" rel="noopener noreferrer"&gt;
        boxyhq
      &lt;/a&gt; / &lt;a href="https://github.com/boxyhq/jackson" rel="noopener noreferrer"&gt;
        jackson
      &lt;/a&gt;
    &lt;/h2&gt;
    &lt;h3&gt;
      🔥 Streamline your web application's authentication with Jackson, an SSO service supporting SAML and OpenID Connect protocols. Beyond enterprise-grade Single Sign-On, it also supports Directory Sync via the SCIM 2.0 protocol for automatic user and group provisioning/de-provisioning. 🤩
    &lt;/h3&gt;
  &lt;/div&gt;
  &lt;div class="ltag-github-body"&gt;
    
&lt;div id="readme" class="md"&gt;
&lt;div class="markdown-heading"&gt;
&lt;h1 class="heading-element"&gt;SAML Jackson: Open Source Enterprise SSO And Directory Sync&lt;/h1&gt;
&lt;/div&gt;

&lt;p&gt;&lt;a href="https://bestpractices.coreinfrastructure.org/projects/7493" rel="nofollow noopener noreferrer"&gt;&lt;img src="https://camo.githubusercontent.com/3edfd6a63b93427a8b61cf54425dad9f98c5820f8ff2b3cfa9b1f57c4b8ac876/68747470733a2f2f626573747072616374696365732e636f7265696e6672617374727563747572652e6f72672f70726f6a656374732f373439332f6261646765" alt="OpenSSF Best Practices Badge"&gt;&lt;/a&gt;
&lt;a href="https://www.npmjs.com/package/@boxyhq/saml-jackson" rel="nofollow noopener noreferrer"&gt;&lt;img src="https://camo.githubusercontent.com/8ec58b9b815dd8f3e5ef976fb5441757beb1e3b4e22b1ca371f4e33810a722c8/68747470733a2f2f696d672e736869656c64732e696f2f6e706d2f64742f40626f787968712f73616d6c2d6a61636b736f6e" alt="NPM downloads badge"&gt;&lt;/a&gt;
&lt;a href="https://hub.docker.com/r/boxyhq/jackson" rel="nofollow noopener noreferrer"&gt;&lt;img src="https://camo.githubusercontent.com/a4e44d8ab9a1a3aa1da716a95c7e41bc803315b19631afe301021c417c921656/68747470733a2f2f696d672e736869656c64732e696f2f646f636b65722f70756c6c732f626f787968712f6a61636b736f6e" alt="Docker pull statistics badge"&gt;&lt;/a&gt;
&lt;a href="https://github.com/boxyhq/jackson/blob/main/LICENSE" rel="noopener noreferrer"&gt;&lt;img src="https://camo.githubusercontent.com/6ff0c3e58dbb0437ba71a92c418dddd20aec82b64f259f6abd2691b0d25b1ba1/68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f6c6963656e73652f626f787968712f6a61636b736f6e" alt="Apache 2.0 license badge"&gt;&lt;/a&gt;
&lt;a href="https://github.com/boxyhq/jackson/issues" rel="noopener noreferrer"&gt;&lt;img src="https://camo.githubusercontent.com/991d409e68ba02dec61ad2f341df5fcebd7a4010f9f4673f5d90f748501574ef/68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f6973737565732f626f787968712f6a61636b736f6e" alt="Open Github issues badge"&gt;&lt;/a&gt;
&lt;a href="https://github.com/boxyhq/jackson/stargazers" rel="noopener noreferrer"&gt;&lt;img src="https://camo.githubusercontent.com/15549a398b9d29bae35a3876b171447f8933e7a4b070460f1d16b2664a61a219/68747470733a2f2f696d672e736869656c64732e696f2f6769746875622f73746172732f626f787968712f6a61636b736f6e" alt="Github stargazers"&gt;&lt;/a&gt;
&lt;a href="https://www.npmjs.com/package/@boxyhq/saml-jackson" rel="nofollow noopener noreferrer"&gt;&lt;img src="https://camo.githubusercontent.com/e0583d7d459e91813d672b07e0be3dfd1f8e27c138784f6cb2c373573ad9ea7e/68747470733a2f2f696d672e736869656c64732e696f2f6e6f64652f762f40626f787968712f73616d6c2d6a61636b736f6e" alt="Nodejs version support badge"&gt;&lt;/a&gt;
&lt;a href="https://raw.githubusercontent.com/boxyhq/jackson/main/swagger/swagger.json" rel="nofollow noopener noreferrer"&gt;&lt;img src="https://camo.githubusercontent.com/e2a3acac954e001cb770e33b7afd1bee1aa4b3876d04a30074e667e8740096ec/68747470733a2f2f696d672e736869656c64732e696f2f737761676765722f76616c69642f332e303f7370656355726c3d68747470732533412532462532467261772e67697468756275736572636f6e74656e742e636f6d253246626f787968712532466a61636b736f6e2532466d61696e25324673776167676572253246737761676765722e6a736f6e" alt="Swagger Validator badge"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;SAML Jackson bridges or proxies a SAML login flow to OAuth 2.0 or OpenID Connect, abstracting away all the complexities of the SAML protocol. It also supports Directory Sync via the SCIM 2.0 protocol for automatic user and group provisioning/de-provisioning.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;We now also support OpenID Connect providers.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;a rel="noopener noreferrer" href="https://github.com/boxyhq/jacksonsamljackson480.gif"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fgithub.com%2Fboxyhq%2Fjacksonsamljackson480.gif" alt="A quick demo of the admin portal without sound to show an overview of what to expect. It shows features such as SSO, the ability to set up SSO connections, Setup Links, Directory sync, and more"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;div class="markdown-heading"&gt;
&lt;h2 class="heading-element"&gt;Directory Sync&lt;/h2&gt;
&lt;/div&gt;
&lt;p&gt;SAML Jackson also supports Directory Sync based on the SCIM 2.0 protocol.&lt;/p&gt;
&lt;p&gt;Directory sync helps organizations automate the provisioning and de-provisioning of their users. As a result, it streamlines the user lifecycle management process by saving valuable organizational hours, creating a single truth source of the user identity data, and facilitating them to keep the data secure.&lt;/p&gt;
&lt;p&gt;For complete documentation, visit &lt;a href="https://boxyhq.com/docs/directory-sync/overview" rel="nofollow noopener noreferrer"&gt;boxyhq.com/docs/directory-sync/overview&lt;/a&gt;&lt;/p&gt;
&lt;div class="markdown-heading"&gt;
&lt;h2 class="heading-element"&gt;🌟 Why star this repository?&lt;/h2&gt;
&lt;/div&gt;
&lt;p&gt;If you find this project helpful, please consider supporting us by starring &lt;a href="https://github.com/boxyhq/jackson" rel="noopener noreferrer"&gt;the repository&lt;/a&gt; and sharing it with others. This helps others find the project…&lt;/p&gt;
&lt;/div&gt;
  &lt;/div&gt;
  &lt;div class="gh-btn-container"&gt;&lt;a class="gh-btn" href="https://github.com/boxyhq/jackson" rel="noopener noreferrer"&gt;View on GitHub&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;


</description>
      <category>authorization</category>
      <category>security</category>
      <category>sso</category>
    </item>
    <item>
      <title>BoxyHQ - The must-have for your startup's next enterprise customer</title>
      <dc:creator>Deepak Prabhakara</dc:creator>
      <pubDate>Thu, 20 Jul 2023 00:00:00 +0000</pubDate>
      <link>https://dev.to/boxyhq/boxyhq-the-must-have-for-your-startups-next-enterprise-customer-1n85</link>
      <guid>https://dev.to/boxyhq/boxyhq-the-must-have-for-your-startups-next-enterprise-customer-1n85</guid>
      <description>&lt;p&gt;Add plug-and-play features to your SaaS product with BoxyHQ's product suite. Become enterprise-ready!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://boxyhq.com/enterprise-sso"&gt;&lt;br&gt;
&lt;br&gt;
  &lt;br&gt;
  &lt;br&gt;
  &lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ragCp0cM--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://github.com/boxyhq/jackson/assets/66887028/b40520b7-dbce-400b-88d3-400d1c215ea1" class="article-body-image-wrapper"&gt;&lt;img alt="BoxyHQ Banner" src="https://res.cloudinary.com/practicaldev/image/fetch/s--ragCp0cM--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://github.com/boxyhq/jackson/assets/66887028/b40520b7-dbce-400b-88d3-400d1c215ea1" width="800" height="320"&gt;&lt;/a&gt;&lt;br&gt;
&lt;br&gt;
&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Introduction​Intro
&lt;/h2&gt;

&lt;p&gt;BoxyHQ enables you to add plug-and-play enterprise-ready features to your SaaS product.&lt;/p&gt;

&lt;h2&gt;
  
  
  The WhyThey why​
&lt;/h2&gt;

&lt;p&gt;It initially started with identifying the pain of developers having a TON of responsibility — right from infrastructure to actually building the product.&lt;/p&gt;

&lt;p&gt;And with the growing cybersecurity attacks, they need to start thinking about security as well.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--7lZxB4v0--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-locks-7a1184b1ed203b49651e2f1ddb95dda5.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--7lZxB4v0--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-locks-7a1184b1ed203b49651e2f1ddb95dda5.jpeg" alt="locks" width="800" height="534"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Photo by &lt;a href="https://unsplash.com/@flyd2069?utm_source=unsplash&amp;amp;utm_medium=referral&amp;amp;utm_content=creditCopyText"&gt;FLY:D&lt;/a&gt; on &lt;a href="https://unsplash.com/@flyd2069?utm_source=unsplash&amp;amp;utm_medium=referral&amp;amp;utm_content=creditCopyTex"&gt;Unsplash&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;[Cyber-crimes are predicted to cost $10.5 trillion annually by 2025]&lt;/p&gt;

&lt;p&gt;The goal is to help smaller startups become &lt;strong&gt;enterprise-ready.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Because until there’s an enterprise client coming in, security is usually an &lt;em&gt;afterthought.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;But they (enterprise customers) are the ones who question your security posture, compliances and more — as a company.&lt;/p&gt;

&lt;p&gt;[About 70% of development teams skip crucial security steps due to time pressures.]&lt;/p&gt;

&lt;p&gt;That’s where BoxyHQ comes in.&lt;/p&gt;

&lt;h4&gt;
  
  
  &lt;em&gt;But wait… What is enterprise-readiness?&lt;/em&gt;​
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--zicsEkLu--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-question-5674e22de525d906508173e251350ac9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--zicsEkLu--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-question-5674e22de525d906508173e251350ac9.png" alt="Question" width="800" height="534"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In a nutshell, it’s being secure, scalable, stable, and easy to run in production.&lt;/p&gt;

&lt;p&gt;According to &lt;strong&gt;Sama — Carlos Samame (Co-Founder)&lt;/strong&gt;, there are 2 paths for startups towards the need to be enterprise-ready:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Initially focused on smaller customers and now looking to expand.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Building a new product and targeting enterprise customers from Day 1.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;em&gt;But how do things look like from the enterprises’ end?&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Enterprise customers are often apprehensive (concerned) about trusting startups vs. established businesses. Because the stakes are usually much higher.&lt;/p&gt;

&lt;h4&gt;
  
  
  They’re mainly looking for 2 things:​
&lt;/h4&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Your other enterprise customers (helps credibility)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Whether you follow the compliance requirements (key necessity)&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;They look for quite a few standards to be met in a solution provider 👇🏻&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--zXGsLqOQ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-enterprise-ready1-1834463a2c9946a0349a34649f1a5a20.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--zXGsLqOQ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-enterprise-ready1-1834463a2c9946a0349a34649f1a5a20.webp" alt="enterprise-ready1" width="800" height="637"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Source &lt;a href="https://www.enterpriseready.io/"&gt;EnterpriseReady.io&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--CYB1oL2R--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-enterprise-ready2-d301dacbf42162783f0e4383dc56134e.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--CYB1oL2R--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-enterprise-ready2-d301dacbf42162783f0e4383dc56134e.webp" alt="enterprise-ready2" width="800" height="655"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Source &lt;a href="https://www.enterpriseready.io/"&gt;EnterpriseReady.io&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;Before you feel overwhelmed, he further adds that you don’t need to start building all of this, and focus on 3 key areas:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
#### Customer obsession​
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Understand their current needs, pains, motivations, processes, and most importantly — whether the plenty of software they already use will work smoothly with yours.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
#### Time to market​
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Invest in off-the-shelf enterprise readiness solutions that you can integrate into your SaaS app vs. spending months building in-house. Spend more time on your core product vs. non-core features.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
#### Reduced engineering costs​
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Investing in external solutions saves developer time spent on coding, fixing bugs, and the overall learning curve.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;“People’s time is more expensive than developer tools.”&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;A great way is to rely on open easily available open source solutions.&lt;/p&gt;

&lt;p&gt;Source: &lt;a href="https://boxyhq.com/blog/three-reasons-not-to-build-enterprise-features"&gt;Be enterprise-ready: 3 reasons not to build enterprise features!&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  The BoxyHQ suite — in the chronological order of release.​
&lt;/h2&gt;

&lt;h3&gt;
  
  
  1. Open Source SAML Jackson​
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--h7-sbU8G--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-admin-portal-02cc1a4cd113f7227c802a8ab6557e03.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--h7-sbU8G--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-admin-portal-02cc1a4cd113f7227c802a8ab6557e03.jpeg" alt="Admin Portal" width="800" height="520"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Yep, that’s the product’s name. Pulp Fiction fans get the reference but for others–&lt;/p&gt;

&lt;p&gt;💡 &lt;em&gt;Pulp Fiction is a 1994 American crime film written and directed by Quentin Tarantino. Samuel Jackson starred in a leading role.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;SAML SSO was the first product created by Team BoxyHQ — pioneering their vision for enterprise readiness. (Launched on August 4, 2022)&lt;/p&gt;

&lt;p&gt;SAML: Security Assertion Markup Language SSO: Single Sign-on&lt;/p&gt;

&lt;h4&gt;
  
  
  What does it do?​
&lt;/h4&gt;

&lt;p&gt;It offers an out-of-the-box solution for deploying SAML quickly and efficiently — helping your &amp;lt;!-- --&amp;gt;*&amp;lt;!-- --&amp;gt;enterprise customers manage access controls on their systems.&lt;/p&gt;

&lt;h4&gt;
  
  
  How does it work?​
&lt;/h4&gt;

&lt;p&gt;Just connect your product to BoxyHQ and everything else is managed for you!&lt;/p&gt;

&lt;p&gt;BoxyHQ connects to almost every identity providers for you to go from the first line of code to fully support SAML in just a week!&lt;/p&gt;

&lt;h3&gt;
  
  
  What are its benefits?​
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--7KvRtlbi--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-admin-portal2-f78e4a630ae5627b897db98d565478dc.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--7KvRtlbi--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-admin-portal2-f78e4a630ae5627b897db98d565478dc.jpeg" alt="Admin Portal" width="800" height="520"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  Centralized management and increased security 🔒​
&lt;/h4&gt;

&lt;p&gt;Enable your customers to manage access control on their own systems so they can:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Have the right access&lt;/li&gt;
&lt;li&gt;Prevent password sharing&lt;/li&gt;
&lt;li&gt;Easily grant and revoke access as needed&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  Better user experience ✨​
&lt;/h4&gt;

&lt;p&gt;Just need to log in once to access all the external services on a dashboard with a single click. It’s simple and easy to use.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Saves users’ time&lt;/li&gt;
&lt;li&gt;Improves your product’s UX&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  Reduces cost​s💲​
&lt;/h4&gt;

&lt;p&gt;All the account information is maintained and managed by the IdP vs. multiple services. This helps in saving costs.&lt;/p&gt;

&lt;p&gt;(IdP is the identity provider — the single point that let its users access all the services from it)&lt;/p&gt;

&lt;p&gt;&lt;em&gt;“The idea behind SAML SSO is that by centralizing your access to an external system you can better manage access and permission as well as improve security.”&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;em&gt;Aswin Venugopal, Senior Software Engineer&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  TL;DR​
&lt;/h3&gt;

&lt;h4&gt;
  
  
  Without BoxyHQ’s SAML SSO, on the user side 😔​
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--RdQ4VPkw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-sso-connection-475fb944937992f866738af225e20f43.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--RdQ4VPkw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-sso-connection-475fb944937992f866738af225e20f43.webp" alt="SSO connection without BoxyHQ" width="800" height="419"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Without BoxyHQ&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Spend a long time to build a SAML integration&lt;/li&gt;
&lt;li&gt;Create integrations for each of your customer’s identity providers (IdP)&lt;/li&gt;
&lt;li&gt;Spend time, energy, focus, and resources away from your core product&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  With BoxyHQ’S SAML SSO authentication 🤠​
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--zxdlayYB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-sso-connection2-9393b0b3ae889c41d3c5e1ff026b3e16.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--zxdlayYB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-sso-connection2-9393b0b3ae889c41d3c5e1ff026b3e16.webp" alt="SSO connection with BoxyHQ" width="800" height="419"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;With BoxyHQ&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Centralize management&lt;/li&gt;
&lt;li&gt;Improve security&lt;/li&gt;
&lt;li&gt;Enhance user experience&lt;/li&gt;
&lt;li&gt;Increase productivity&lt;/li&gt;
&lt;li&gt;Save time, reduce costs&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  On the solution provider’s side, it looks like:​
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--3h_W3Bzw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-sso-connection3-728f29eee05af16861f16fa466eb7fc9.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--3h_W3Bzw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-sso-connection3-728f29eee05af16861f16fa466eb7fc9.webp" alt="SSO connection without BoxyHQ" width="800" height="505"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Without BoxyHQ&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--S9Yoa287--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-sso-connection4-fe896577d90c12df0c18b1661c5d7daa.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--S9Yoa287--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-sso-connection4-fe896577d90c12df0c18b1661c5d7daa.webp" alt="SSO connection with BoxyHQ" width="800" height="505"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;With BoxyHQ&lt;/p&gt;

&lt;p&gt;Here, you only have to connect your product with a direct integration to BoxyHQ and then it manages and connects you to all the IDPs. You can deploy SAML SSO with just a few lines of code!&lt;/p&gt;

&lt;p&gt;🔗 The sources are linked &lt;a href="https://boxyhq.com/blog/understanding-saml-sso-the-basics-from-the-user-side"&gt;here&lt;/a&gt; and &lt;a href="https://boxyhq.com/blog/understanding-saml-sso-the-basics-from-the-solution-providers-side"&gt;here&lt;/a&gt; (official BoxyHQ blogs)&lt;/p&gt;

&lt;p&gt;&lt;em&gt;“Deepak (Co-Founder) himself helped us implement SSO SAML in cal.com and we’re more than happy about it! it’s great to finally see an open source project tackle enterprise-ready features!”&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;— Peer Richelsen, Co-Founder at Cal.com&lt;/p&gt;

&lt;p&gt;Note: Team BoxyHQ recently re-launched the enhanced &lt;a href="https://www.producthunt.com/products/boxyhq#open-source-saml-sso-by-boxyhq-2"&gt;SAML SSO on Product Hunt&lt;/a&gt;! 🚀&lt;/p&gt;

&lt;h3&gt;
  
  
  2. Open Source Directory Sync​
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--NjJRdu8c--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-ds-connection-6aa258ce3f0bc3811ca69fd8161c8c46.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--NjJRdu8c--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-ds-connection-6aa258ce3f0bc3811ca69fd8161c8c46.webp" alt="Directory Sync Connection" width="800" height="344"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Organizations use directories from different providers to manage user access to organization resources.&lt;/p&gt;

&lt;p&gt;BoxyHQ’s Directory Sync lets orgs activate and deactivate user accounts, create groups, and keep their app in sync with the user directory in real time.&lt;/p&gt;

&lt;p&gt;💡 &lt;em&gt;In an enterprise customer context, a directory is a central repository that holds information about employees, customers, and other resources in a company.&lt;/em&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  In simple words, you enable your customers to:​
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Have higher security standards&lt;/li&gt;
&lt;li&gt;Centrally manage their user’s access lifecycle&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It supports the SCIM 2.0 protocol&lt;/p&gt;

&lt;p&gt;SCIM: System for Cross-domain Identity Management&lt;/p&gt;

&lt;p&gt;&lt;em&gt;“Directory Sync streamlines the user lifecycle management process by saving valuable organizational hours, creating a single truth source of the user identity data, and facilitating them to keep the data secure.”&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;-&lt;em&gt;BoxyHQ Official Docs&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Learn more: &lt;a href="https://boxyhq.com/docs/directory-sync/examples"&gt;Examples &amp;amp; Resources (Directory Sync)&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  3. Open Source Audit Logs​
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ItpKZXMR--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-audit-logs-8ebf5892b1fdadffb31f65832b12c33e.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ItpKZXMR--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-audit-logs-8ebf5892b1fdadffb31f65832b12c33e.webp" alt="Open Source Audit Logs" width="800" height="588"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;BoxyHQ’s Audit Logs ‘Retraced’ offer your enterprise customers the ability to record and search events that happen on your application.&lt;/p&gt;

&lt;p&gt;Note: Retraced was initially built by Replicated and has been enhanced by BoxyHQ.&lt;/p&gt;

&lt;p&gt;They provide a detailed record of user actions, and can be used to monitor potential security breaches, compliance violations, and other issues.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;“The world’s best SaaS companies offer detailed Audit Logs, your SaaS should too as you move into serving the enterprise segment.”&lt;/em&gt; -&lt;em&gt;Vanshika Srivastava&lt;/em&gt;&lt;/p&gt;

&lt;h4&gt;
  
  
  Why are Audit Logs important?​
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Nubp3iqN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-audit-logs2-7c8816f7d05ce34b4feb6b0c677def0a.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Nubp3iqN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-audit-logs2-7c8816f7d05ce34b4feb6b0c677def0a.jpeg" alt="Open Source Audit Logs2" width="800" height="462"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For most companies, the ability to monitor the flow of data and be alerted to any breaches is super essential.&lt;/p&gt;

&lt;p&gt;Audit logs help to pinpoint any misuse of information and ensure that data policies are followed ✅&lt;/p&gt;

&lt;p&gt;This one simple API helps you become compliant fast, and ensure your customers get all the functionality and safety they need.&lt;/p&gt;

&lt;h3&gt;
  
  
  4. Admin Portal​
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--CIbQBUWs--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-admin-portal3-b148491eef73ed45f92dce5cf1d5f995.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--CIbQBUWs--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-admin-portal3-b148491eef73ed45f92dce5cf1d5f995.jpeg" alt="Admin Portal3" width="800" height="441"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Manage Enterprise SSO, Directory Sync, and Audit Logs products via an easy-to-use web interface.&lt;/p&gt;

&lt;p&gt;It can help you streamline your workflows and increase productivity.&lt;/p&gt;

&lt;p&gt;You can use the authentication method of your choice (Magic Link, Email and Passsword, SAML/OIDC Single-sign-on)&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--4Te4SGO7--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-admin-portal4-75a7906e4c1bc97e12151ab78310cfeb.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--4Te4SGO7--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-admin-portal4-75a7906e4c1bc97e12151ab78310cfeb.jpeg" alt="Admin Portal4" width="800" height="446"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;BoxyHQ’s future products (where relevant) will also be available in the Admin Portal.&lt;/p&gt;

&lt;p&gt;To enable the Admin Portal, you need to deploy &lt;a href="https://boxyhq.com/docs/jackson/deploy/service"&gt;Jackson as a service&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;
  
  
  5. Data Privacy Vault​
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--OxRmVREw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-privacy-vault-81d1c7995e501eaba4b63668ac8d5e43.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--OxRmVREw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-privacy-vault-81d1c7995e501eaba4b63668ac8d5e43.webp" alt="Privacy Vault" width="800" height="369"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In the day and age of high cyber-crime, and increasingly sensitive data– you need to protect your customer’s data &lt;em&gt;and&lt;/em&gt; trust.&lt;/p&gt;

&lt;p&gt;Privacy vault is BoxyHQ’s open-source solution to centralize, isolate, and govern all the sensitive data you collect.&lt;/p&gt;

&lt;h4&gt;
  
  
  With the Privacy Vault, you can:​
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Identify all the sensitive data from clients’ application database and move it to the vault.&lt;/li&gt;
&lt;li&gt;Replace the sensitive data in their application database with (exchangeable) opaque tokens.&lt;/li&gt;
&lt;li&gt;Gain control over where the sensitive data goes, who has access to it and for what duration.&lt;/li&gt;
&lt;li&gt;Create access policies that adhere to data regulations and geographic regulations.&lt;/li&gt;
&lt;li&gt;Get the ability to respond to DSRs (Data Subject Requests) from customers.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  What users are saying 💬​
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--WXv8OKHd--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-calcom-8630ca3cd90c4211f24b1f301b3f0dc8.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--WXv8OKHd--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-calcom-8630ca3cd90c4211f24b1f301b3f0dc8.webp" alt="Cal.com" width="800" height="428"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;“It let our team focus on what we do best (democratizing scheduling for everyone) without getting distracted by the needs of our enterprise customers. Did I mention it’s open-source and free?”&lt;/em&gt;&lt;br&gt;
 &lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--DsVcO5jH--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/img/blog/scoutflo-blog-supertokens.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--DsVcO5jH--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/img/blog/scoutflo-blog-supertokens.webp" alt="" width="400" height="400"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Super Tokens — An open-source authentication solution&lt;/p&gt;

&lt;p&gt;&lt;em&gt;“We at SuperTokens needed to provide SAML login to our users, and instead of building it from scratch, we found the perfect open source project — BoxyHQ!”&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--k8XkMsju--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-news-b56814dbbbea5f26ad6eca1c8d1a06d7.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--k8XkMsju--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-news-b56814dbbbea5f26ad6eca1c8d1a06d7.webp" alt="News" width="800" height="252"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Media Features&lt;/p&gt;

&lt;h3&gt;
  
  
  Meet the Founders ✨​
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--BeLVCsLl--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-founders-deepak-17432483315ecac8ac2a6f80e89fc80f.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--BeLVCsLl--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-founders-deepak-17432483315ecac8ac2a6f80e89fc80f.webp" alt="Founders - Deepak" width="800" height="777"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Deepak Prabhakara, CEO &amp;amp; Co-founder&lt;/p&gt;

&lt;p&gt;&lt;a href="https://twitter.com/deepakprab"&gt;Deepak&lt;/a&gt; has over 2 decades of experience in design, architecture and development of complex software products across different SaaS and mobile platforms.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Exi8T7GP--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-founders-sama-8ccb70c6cdd901b54872e2fbe6899f84.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Exi8T7GP--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-founders-sama-8ccb70c6cdd901b54872e2fbe6899f84.webp" alt="Founders - Sama" width="800" height="800"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://twitter.com/caloique"&gt;Sama&lt;/a&gt; has 15+ years of experience working at tech companies across different business areas and continents.&lt;/p&gt;

&lt;h3&gt;
  
  
  The BoxyHQ Pledge 📜​
&lt;/h3&gt;

&lt;p&gt;&lt;em&gt;“As long-time users and contributors to the open-source ecosystem, we want to do the right thing for the community. That means we will make sure that our core open-source code stays open. We will also strive to use open standards where possible. We want to collaborate with the community to build towards our vision to make security, compliance and privacy easy for developers so they can focus on their core product while being compliant...”&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Learn more here: &lt;a href="https://boxyhq.com/pledge"&gt;BoxyHQ pledges to keep our core open-source code open&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  What’s Next for BoxyHQ 🚀​
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--NkD_0Rfh--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-features-c29a80a484e382b2d08e43e3b2f6f0af.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--NkD_0Rfh--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/scoutflo-blog-features-c29a80a484e382b2d08e43e3b2f6f0af.webp" alt="Features" width="800" height="487"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You can &lt;a href="https://boxyhq.com/saas-registration"&gt;sign up for the waitlist&lt;/a&gt; before August 1, and make the most of this limited-time offer.&lt;/p&gt;

&lt;p&gt;Check out BoxyHQ’s &lt;a href="https://github.com/boxyhq"&gt;GitHub page&lt;/a&gt;, official &lt;a href="https://boxyhq.com/docs"&gt;documentation&lt;/a&gt;, and &lt;a href="https://twitter.com/boxyhq"&gt;Twitter&lt;/a&gt; profile. 🚀&lt;/p&gt;

&lt;p&gt;And don’t forget to follow &lt;a href="https://atlas-home.scoutflo.com/?ref=blog.scoutflo.com"&gt;Scoutflo&lt;/a&gt; on &lt;a href="https://twitter.com/scout_flo?ref=blog.scoutflo.com"&gt;Twitter&lt;/a&gt; if you haven’t already! ✨&lt;/p&gt;

&lt;p&gt;We’re also active on LinkedIn 💙&lt;/p&gt;

&lt;p&gt;Cover photo by &lt;a href="https://unsplash.com/@danny144?utm_source=unsplash&amp;amp;utm_medium=referral&amp;amp;utm_content=creditCopyText"&gt;Dan Nelson&lt;/a&gt; on &lt;a href="https://unsplash.com/photos/ah-HeguOe9k?utm_source=unsplash&amp;amp;utm_medium=referral&amp;amp;utm_content=creditCopyText"&gt;Unsplash&lt;/a&gt;&lt;/p&gt;

</description>
      <category>enterprise</category>
      <category>security</category>
    </item>
    <item>
      <title>The new era of Application Security: Security Building Blocks for Developers</title>
      <dc:creator>Deepak Prabhakara</dc:creator>
      <pubDate>Mon, 10 Jul 2023 00:00:00 +0000</pubDate>
      <link>https://dev.to/boxyhq/the-new-era-of-application-security-security-building-blocks-for-developers-5din</link>
      <guid>https://dev.to/boxyhq/the-new-era-of-application-security-security-building-blocks-for-developers-5din</guid>
      <description>&lt;h2&gt;
  
  
  The new era of Application Security: Security Building Blocks for Developers​
&lt;/h2&gt;

&lt;p&gt;With the proliferation of data breaches and cyber-attacks, developers must take a proactive approach to security. BoxyHQ's Security Building Blocks for Developers are designed to help developers build and deploy secure applications with minimal effort and expertise.&lt;/p&gt;

&lt;p&gt;In addition to their core products security teams are finding it hard to keep pace with new no-code and low-code apps that are being created in the company. The arrival of Generative AI and ChatGPT has complicated the landscape even further.&lt;/p&gt;

&lt;p&gt;The importance of integrating robust security measures into software applications cannot be overstated. BoxyHQ, a security-focused platform for developers, is leading the way with its Security Building Blocks for Developers, inspired by the concept of &lt;a href="https://mvsp.dev/mvsp.en/"&gt;Minimum Viable Security&lt;/a&gt; (MVS) championed by &lt;a href="https://mvsp.dev"&gt;mvsp.dev&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;BoxyHQ is set to revolutionize application security. Drawing insights from industry pioneers such as Twilio, Stripe, HashiCorp, and Snyk, BoxyHQ's open-source Security Building Blocks offer a comprehensive solution that empowers developers to build secure software products with ease and efficiency.&lt;/p&gt;

&lt;h2&gt;
  
  
  Building and Shipping Secure Software Products in Hours, Not Months​
&lt;/h2&gt;

&lt;p&gt;Building and shipping security features in hours instead of months is now a reality. In the fast-paced world of software development, time is of the essence. Traditional approaches to security often involve time-consuming and complex implementations. However, by embracing BoxyHQ's Security Building Blocks, developers can now build and ship secure software products in a fraction of the time it would take to develop these features from scratch. This not only saves valuable time but also accelerates time-to-market, giving businesses a competitive edge.&lt;/p&gt;

&lt;h2&gt;
  
  
  Democratizing Secure Development: Making Security Accessible to All​
&lt;/h2&gt;

&lt;p&gt;The developer community has long embraced the open-source movement. Open-source software fosters collaboration, innovation, and rapid evolution. By offering Security Building Blocks as open-source projects, BoxyHQ empowers developers to contribute, customize, and tailor security features to suit their specific needs. This flexibility not only enables developers to address unique requirements but also creates an ecosystem where best practices and security advancements are shared, benefiting the entire community. We hypothesize that in the future many of these security features will be a commodity, and will be implemented by any software product, not just the ones that need to be enterprise-grade.&lt;/p&gt;

&lt;h2&gt;
  
  
  Minimum Viable Security (MVS): Building a Strong Foundation​
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--M_F8PNC8--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/purple-building-blocks-8ea95b3166a7dea1ad63c19b72820f3f.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--M_F8PNC8--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/purple-building-blocks-8ea95b3166a7dea1ad63c19b72820f3f.jpg" alt="Security Building Blocks" width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Photo by &lt;a href="https://unsplash.com/@theshubhamdhage?utm_source=unsplash&amp;amp;utm_medium=referral&amp;amp;utm_content=creditCopyText"&gt;Shubham Dhage&lt;/a&gt; on &lt;a href="https://unsplash.com/?utm_source=unsplash&amp;amp;utm_medium=referral&amp;amp;utm_content=creditCopyText"&gt;Unsplash&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Minimum Viable Security (MVS) is a concept focused on identifying and implementing the essential security measures necessary to protect an application from common threats. BoxyHQ embraces the principles of MVS and provides developers with Security Building Blocks that address these foundational security needs. By adopting an MVS approach, developers can prioritize the integration of critical security features, ensuring a solid foundation for their applications while minimizing unnecessary complexity and overhead.&lt;/p&gt;

&lt;h2&gt;
  
  
  Comprehensive Integration: Uniting Security Features for Maximum Effectiveness​
&lt;/h2&gt;

&lt;p&gt;BoxyHQ's Security Building Blocks integrate multiple security components, each designed to address a specific aspect of application security. By combining these features, developers can create a comprehensive security framework for their applications. Whether it's the secure authentication facilitated by the Enterprise Single Sign-On (SSO) product, the real-time synchronization provided by Directory Sync, the compliant logs generated by Audit Logs (Retraced), or the encrypted storage capabilities of the Data Privacy Vault (PII, PCI, PHI compliant), these components seamlessly work together to strengthen the overall security posture of applications.&lt;/p&gt;

&lt;h2&gt;
  
  
  Closing the Gap Between Compliance and Security​
&lt;/h2&gt;

&lt;p&gt;One of the key advantages of BoxyHQ is its ability to bridge the gap between compliance and security. With the increasing focus on cybersecurity vulnerabilities, compliance alone is not sufficient to protect against threats. BoxyHQ's comprehensive suite of open-source security components ensures that developers can not only meet compliance requirements but also implement robust security measures. By integrating these building blocks, businesses can confidently navigate the complex landscape of security and compliance, safeguarding their data and systems while staying ahead of potential threats. Aligned with this vision we consolidated a list of free &lt;a href="https://github.com/boxyhq/awesome-oss-devsec"&gt;awesome open-source developer-first security tools&lt;/a&gt; that includes security principles and controls relevant to popular compliance certifications. (like ISO27001, SOC2, MVSP, etc)&lt;/p&gt;

&lt;p&gt;The security building blocks for developers are supported by extensive documentation, an admin portal for easy management, and customer support and advice for each customer's unique needs. BoxyHQ's products represent a significant step forward for developers looking to improve the security of their applications.&lt;/p&gt;

&lt;p&gt;In conclusion, BoxyHQ aims to make a significant impact on the industry. By providing simple and efficient integrations for minimum viable security features, BoxyHQ is helping to ensure that developers and businesses of all sizes can protect their sensitive data and systems against threats, ultimately making the internet a safer place for everyone.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>🔨Build Enterprise Software with No-Code 💬Thanks to Bubble.io</title>
      <dc:creator>Nathan Tarbert</dc:creator>
      <pubDate>Thu, 11 May 2023 00:00:00 +0000</pubDate>
      <link>https://dev.to/boxyhq/build-enterprise-software-with-no-code-thanks-to-bubbleio-dpn</link>
      <guid>https://dev.to/boxyhq/build-enterprise-software-with-no-code-thanks-to-bubbleio-dpn</guid>
      <description>&lt;p&gt;Building your enterprise applications on Bubble is now easier than ever with BoxyHQ, a single API to connect to enterprise Single Sign-On (SSO), and multiple security compliance features.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdyzn66y8b2ab5qnfm8cx.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdyzn66y8b2ab5qnfm8cx.gif" alt="Cat" width="576" height="584"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  What is Bubble.io?​
&lt;/h2&gt;

&lt;p&gt;Bubble is a visual drag-and-drop programming language. Instead of scripting code, users can leverage a visual interface to build applications - simple or complex. This makes building apps accessible to people (or teams) with a big idea - but no programming skills.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is a Bubble.io Plugin?​
&lt;/h2&gt;

&lt;p&gt;Plugins are third-party Bubble.io components that are not part of the Bubble core platform functionality. They can be freely provided by the creators or available as a paid plugin.&lt;/p&gt;

&lt;h2&gt;
  
  
  Bubble Makes It Simple​
&lt;/h2&gt;

&lt;p&gt;One of the benefits of using a no-code platform like Bubble is that not only can you build an application quickly, but you also have the ability to architect complex features. If we look back just a few years, this was not possible. You would have 2 options:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Hire a developer or development team&lt;/li&gt;
&lt;li&gt;Delegate to a developer or team&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;But we live in an era where technology is continually evolving and individuals' or teams' creativity has no limits. We can put ourselves in the shoes of someone who doesn’t write code but wants to build a professional application - with Bubble.io this is now a possibility.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fridjp6z327iqsxtmc1rg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fridjp6z327iqsxtmc1rg.png" alt="Image description" width="300" height="300"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Top 3 reasons small businesses or enterprises should switch to a no-code platform​
&lt;/h2&gt;

&lt;p&gt;&lt;em&gt;This comes with a caveat that &lt;a href="https://coachingnocodeapps.com/how-long-does-it-take-to-learn-bubble-and-how-much-does-it-cost"&gt;Bubble does have a learning curve&lt;/a&gt; but once you get familiar with the platform it’s much easier to build applications.&lt;/em&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  1. 🤑 Using a no-code solution like Bubble saves money on IT:​
&lt;/h2&gt;

&lt;p&gt;Typical app development workflow costs for SMBs (small to medium businesses) from design to implementation can range from $75,000 to $750,000. This can be crippling for startups which opens up a no-code solution as a better alternative. If we are talking about enterprise development, this number can reach up to millions.&lt;/p&gt;

&lt;h2&gt;
  
  
  2. 🔑 Time to value:​
&lt;/h2&gt;

&lt;p&gt;This depends on what type of app you want to build. Some estimations are up to &lt;a href="https://medium.com/swlh/could-i-build-my-product-on-bubble-io-75923a41b9b6"&gt;80% in development time saved&lt;/a&gt;. Let’s take into consideration there is no need to set time-consuming tasks for a developer such as basic features and environment setup. This is all taken care of for you when building in Bubble’s platform.&lt;/p&gt;

&lt;h2&gt;
  
  
  3. 🚀 Built-in SEO:​
&lt;/h2&gt;

&lt;p&gt;Whether you are a startup or an enterprise team, but inexperienced in the art of Search Engine Optimization (SEO), not to worry, Bubble has built-in &lt;a href="https://manual.bubble.io/help-guides/customizing-an-application/seo#bubbles-seo-tools"&gt;SEO tools&lt;/a&gt; that allow you to the ability to modify and customize how your application is seen by search engine crawlers. This would be in the advanced settings and great care should be taken when enabling or modifying these settings because, by default, your application will not be indexed.&lt;/p&gt;

&lt;p&gt;This brings a lot of value when you don’t necessarily need a professional marketing division to start with. Right out of the gate, you can build an application that has professional capabilities to successfully reach your target persona.&lt;/p&gt;

&lt;h2&gt;
  
  
  Can I add enterprise features on Bubble?​
&lt;/h2&gt;

&lt;p&gt;One of the foundational needs of any new business app is the ability for users to securely log in to password-protected areas - like a shopping cart or protected content. If we look at enterprise features like SAML SSO for instance, you may think this is a feature that is out of reach for a no-code platform, but you can simply search within the Bubble marketplace and a list of plugin creators has made this possible. Instantly you get a short list of plugins available for the functionality you would like to implement.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Ixp5Pqu6--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/bubble-plugin-d42945f021e1b37d30939ff6b2e32555.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Ixp5Pqu6--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/bubble-plugin-d42945f021e1b37d30939ff6b2e32555.png" alt="BoxyHQ plugin" width="800" height="178"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;BoxyHQ is one of those creators. By simply installing the plugin into your Bubble.io app, you can be up and running with little configuration effort. We have written a step-by-step &lt;a href="https://boxyhq.com/guides/jackson/integrations/bubble"&gt;guide&lt;/a&gt; to help you properly configure setting up SAML single sign-on for your small to medium business (SMB) or enterprise application.&lt;/p&gt;

&lt;p&gt;Once you have BoxyHQ’s plugin properly configured, you now have an application that will handle secure login access to your users using SAML single sign-on that will connect to any IdP (Identity Provider) like Okta, OneLogin, Azure AD, etc.&lt;/p&gt;

&lt;p&gt;This is when you can breathe a sigh of relief because there is now no need to remember usernames and passwords. BoxyHQ’s plugin easily provides that solution for you. If you would like to test a &lt;a href="https://boxyhq-saml-sso.bubbleapps.io/version-test"&gt;demo application&lt;/a&gt; click here to see the flow and enjoy the seamless experience you will have inside the Bubble platform.&lt;/p&gt;

&lt;p&gt;If you are interested in understanding what’s happening on the backend, we have a &lt;a href="https://boxyhq.com/blog/understanding-saml-sso-the-basics-from-the-user-side"&gt;guide&lt;/a&gt; available that will walk you through the technical aspects of single sign-on.&lt;/p&gt;

&lt;p&gt;SSO can be complicated but BoxyHQ makes it simple to understand.&lt;/p&gt;

</description>
      <category>bubble</category>
      <category>sso</category>
      <category>security</category>
      <category>nocode</category>
    </item>
    <item>
      <title>SSO "Wall of Shame" vs "Wall of Fame"</title>
      <dc:creator>Deepak Prabhakara</dc:creator>
      <pubDate>Thu, 30 Mar 2023 00:00:00 +0000</pubDate>
      <link>https://dev.to/boxyhq/sso-wall-of-shame-vs-wall-of-fame-4609</link>
      <guid>https://dev.to/boxyhq/sso-wall-of-shame-vs-wall-of-fame-4609</guid>
      <description>&lt;p&gt;Unless you have been living under a rock, you have probably heard of the SSO Wall of Shame. This is a list of vendors that treat single sign-on as a luxury feature, not a core security requirement. There have been numerous complaints regarding the companies that have made it onto this list, and rightfully so. In a downturn economy and in times when security and privacy are critical, many organizations see an opportunity to generate even more revenue.&lt;/p&gt;

&lt;p&gt;This is a small example, listed in alphabetical order of some of the most well-known companies that have ended up on the “Wall of Shame” (see the screenshot below). You can find more information and the full list at &lt;a href="https://sso.tax"&gt;sso.tax&lt;/a&gt;. It is clear that raising prices for enterprise SSO and other security features, such as Audit Logs (to track critical events), is just part of their revenue model.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--qemHBq53--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/sso-tax-list-b0ccee4c71a8d09fad40792e3739a5b9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--qemHBq53--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/sso-tax-list-b0ccee4c71a8d09fad40792e3739a5b9.png" alt="sso tax list" width="800" height="866"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;But is this the right thing to do? It’s hard to judge from the outside, and clearly companies need to make a profit while showing growth, especially when you are backed by Venture Capital. Having said that, at BoxyHQ we believe that we can all do better (we are also Venture funded). Nonetheless, cybersecurity taxes should stop, and we should all focus on increasing our security posture and making a positive impact. Take for example, Hubspot charging 6300% more for SSO functionality! That is a clear example of how absurd and abusive some companies can be.&lt;/p&gt;

&lt;p&gt;Now, we ask ourselves, how about the “Wall of Fame”? This is a separate list of companies that lead by example and don’t take advantage of their customer base. If you do a quick search, you will find some interesting companies listed. Grafana, Cal.com, and Sumo Logic, just to name a few.&lt;/p&gt;

&lt;p&gt;To understand why startups normally lean this way, it’s important to consider the enterprise deal process. With RFPs, security questionnaires, and other compliance-related procedures, closing an enterprise deal becomes all-consuming for a startup. This can justify an enterprise pricing tier. Given a startups early evolution of products, , Enterprise SSO becomes an easy candidate to distinguish the pricing tier gap between charging SMBs and what they can charge enterprises. But building and maintaining SSO is expensive and time-consuming. SAML is not necessarily the easiest protocol implementation to get right. And add to this the customer support issues that come with onboarding large enterprise teams onto the product. But as a startup matures the product needs to have enough core enterprise features and not merely depend on undifferentiated features like SSO.&lt;/p&gt;

&lt;p&gt;To take it full circle, it would be nice to see a full list of the SSO Wall of Fame. Then we could ensure support for the companies with integrity, who have clearly not been overtaken by greed. Unfortunately because of our bandwidth, we can not commit to full ownership of this initiative, but can offer some practical advice on how companies could start offering SSO pricing tiers for free or at a nominal price increase:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Charge for other core enterprise features instead of SSO. If your product is not quite to that level of maturity, please read on.&lt;/li&gt;
&lt;li&gt;Instead of charging for SSO, charge for the security process’s that comes with enterprise deals. If a company wants you to go through its security and compliance process, rather pay a premium to enhance its security posture and reduce compliance risk from its vendors.&lt;/li&gt;
&lt;li&gt;If that scenario isn’t possible then consider segmenting SSO pricing based on the number of users or seats. SMBs will not have a very large number of seats so this could be a possible way to separate your pricing.&lt;/li&gt;
&lt;li&gt;If your Enterprise tier is not based on seats, a natural progression is to base pricing on usage.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We are trying to do our part by providing a free open–source enterprise-grade SSO (called SAML Jackson), that any developer, team, or organization can plug into with just a few lines of code. Check out the GitHub repo &lt;a href="https://github.com/boxyhq/jackson"&gt;here&lt;/a&gt;. Feedback is much appreciated and a star will help us raise security awareness. 🙂&lt;/p&gt;

&lt;p&gt;Stay safe, do good, and avoid the dark side of the SSO tax!&lt;/p&gt;

</description>
      <category>sso</category>
      <category>enterprise</category>
    </item>
    <item>
      <title>SBOM Explained: 📚 An Enterprise Guide to Security Risk Management</title>
      <dc:creator>Nathan Tarbert</dc:creator>
      <pubDate>Wed, 22 Mar 2023 00:00:00 +0000</pubDate>
      <link>https://dev.to/boxyhq/sbom-explained-an-enterprise-guide-to-security-risk-management-57h8</link>
      <guid>https://dev.to/boxyhq/sbom-explained-an-enterprise-guide-to-security-risk-management-57h8</guid>
      <description>&lt;p&gt;In this age of technology, software companies are quickly shifting towards a strict compliance posture. You may ask yourself, why is that and what has changed over the last several years? This can be due to multiple factors but can mainly be boiled down into four categories.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;🔒 Security&lt;/li&gt;
&lt;li&gt;👩‍💻 Product Development&lt;/li&gt;
&lt;li&gt;🦊 Compliance&lt;/li&gt;
&lt;li&gt;⚠️ Supply Chain &amp;amp; Risk Management&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  What is an SBOM or Software Bill of Materials?​
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fiij0e3dxo64we2wh62mh.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fiij0e3dxo64we2wh62mh.gif" alt="cake" width="576" height="311"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You can think of an SBOM as a cake you are baking. That cake has an ingredients list or in the case of software, open-source or private dependencies, and third-party components. This list can be massive and can range from hundreds to thousands, especially when you factor in transitive dependencies (an indirect dependency of the component it relies on). This list gets very complex and is impossible to manage at scale at the enterprise level. Gone are the days when most enterprises or smaller-scale organizations would write applications from scratch. Rather, most applications are assembled using pre-built software packages, i.e open-source. Over the past decade, this has led to the rise and use of publicly available software components and agile development at an enormous rate.&lt;/p&gt;

&lt;h2&gt;
  
  
  Security
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fq4992yqwq5tmeihc8fom.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fq4992yqwq5tmeihc8fom.jpg" alt="Alert" width="800" height="475"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;More organizations now have security top-of-mind due to cyber attacks on business infrastructure becoming almost a daily occurrence. Companies are faced with major decisions that affect cost, efficiency, and productivity. There is an enormous risk and liability where a company’s code base lives in the cloud. This could be private or public but a good rule of thumb when you think about risk is not if we’re breached, but when. So precautions need to be taken to add layers of protection to software infrastructure.&lt;/p&gt;

&lt;p&gt;An SBOM would provide better visibility to companies in identifying and tracking security vulnerabilities that could enable timely patches. Updates in code should prompt a newly generated report (SBOM).&lt;/p&gt;

&lt;p&gt;We could go a lot deeper around all the various ways precautions could be taken like scanning your application for vulnerabilities or penetration testing. A &lt;a href="https://mvsp.dev/"&gt;minimum viable secure product&lt;/a&gt; is of course recommended for all enterprise-ready organizations. It could be as simple as having &lt;a href="https://boxyhq.com/audit-logs"&gt;audit logs&lt;/a&gt; in place to record and search events internally on your application.&lt;/p&gt;

&lt;h2&gt;
  
  
  Product Development​
&lt;/h2&gt;

&lt;p&gt;SBOMs can improve and help software development processes by providing a comprehensive list of all open-source dependencies and components used in a product. From an organizational standpoint, it is crucial to ensure that all software and related components are up-to-date and licensed correctly. Having this clear understanding is key to risk mitigation when it comes to understanding what is in a product and how it is constructed. Therefore, development teams can quickly improve transparency, communication, and collaborative decision-making with a faster time-to-market while ensuring industry compliance standards and regulations.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--plW2OIbr--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/matrix-finger-ca72025234908e82b6fa7a84f55f3899.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--plW2OIbr--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/matrix-finger-ca72025234908e82b6fa7a84f55f3899.jpg" alt="matrix finger" width="640" height="366"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Compliance​
&lt;/h2&gt;

&lt;p&gt;In 2021 the US Government issued an &lt;a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/"&gt;executive order&lt;/a&gt; mandating all software companies that do business with the US government must provide a detailed inventory list (software bill of materials or SBOM) of all components related to the software they have produced and sold to any federal agency. The legislation is geared towards transparency with a view to the enhancement of security for our supply chain infrastructure. This has quickly prompted other countries to consider similar legislation.&lt;/p&gt;

&lt;h2&gt;
  
  
  Supply Chain &amp;amp; Risk Management​
&lt;/h2&gt;

&lt;p&gt;It’s vital to take a proactive approach and have a top-down understanding of all software components that live in a software ecosystem. With that in mind, SBOMs are quickly becoming a standard for software supply chain risk management. With the expansion of sophisticated attacks, it’s more important than ever to take a systematic approach when it comes to the security of your organization.&lt;/p&gt;

&lt;p&gt;The ecosystem is growing with tools that help you verify, scan and monitor all your components and manifest files.&lt;/p&gt;

&lt;p&gt;If you have an open-source product to sell to enterprises or the public sector, you will need to anticipate compliance and build an SBOM into your product. Especially if you are targeting entities in heavily regulated industries. Taking this into consideration, that’s what we did at BoxyHQ for each of our four products with guides that will help you navigate these decisions (Enterprise Single Sign On, Directory Sync, Audit Logs, and Data Privacy Vault). We chose to build &lt;a href="https://www.sigstore.dev/"&gt;Cosign&lt;/a&gt; right into our tool - but many more are available. Here is a &lt;a href="https://github.com/awesomeSBOM/awesome-sbom"&gt;curated list of SBOM-related tools.&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Please visit BoxyHQ’s website to learn more about producing an SBOM for your products. E.g. SBOM for our enterprise SSO: &lt;a href="https://boxyhq.com/docs/jackson/sbom"&gt;BoxyHQ&lt;/a&gt;&lt;/p&gt;

</description>
      <category>sbom</category>
      <category>opensource</category>
      <category>riskmanagement</category>
      <category>security</category>
    </item>
    <item>
      <title>Exploring the open-source business model and how companies monetize it</title>
      <dc:creator>Deepak Prabhakara</dc:creator>
      <pubDate>Mon, 13 Mar 2023 00:00:00 +0000</pubDate>
      <link>https://dev.to/boxyhq/exploring-the-open-source-business-model-and-how-companies-monetize-it-2hai</link>
      <guid>https://dev.to/boxyhq/exploring-the-open-source-business-model-and-how-companies-monetize-it-2hai</guid>
      <description>&lt;p&gt;With the rise of open-source solutions and solution providers, one of the biggest questions asked is, how do businesses monetize while giving away the source code for free?&lt;/p&gt;

&lt;h2&gt;
  
  
  What is an open-source company?​
&lt;/h2&gt;

&lt;p&gt;An open-source company is an organization that develops software but makes the source code freely available to the public. This means that others can copy the code and engine, deploy it themselves, develop it, fix bugs and more. This allows the software not only to be widely accessible for free but also to evolve in a very collaborative way.&lt;/p&gt;

&lt;h2&gt;
  
  
  If everything is free then how can it be monetized?​
&lt;/h2&gt;

&lt;p&gt;We don't have to look very far to find examples of open-source companies that have become unicorns and continue to grow. Some great examples are Elastic ($608 million in revenue, 2021), HashiCorp ($320 million in revenue, 2021), and RedHat ($3.4 billion in revenue, 2021). All these companies operate an open-source business model but have huge revenues and valuations. This is what we are going to look at.&lt;/p&gt;

&lt;p&gt;There are many different ways that open-source companies can monetize - ultimately this comes down to the goals of the business. We are going to explore a few of the options available but keep in mind that these are just some of the ways it can be done and open-source continues to develop and grow at a rapid pace.&lt;/p&gt;

&lt;h3&gt;
  
  
  Donations​
&lt;/h3&gt;

&lt;p&gt;One of the most popular models is to offer the source code and documentation completely free and let its users donate at their discretion. This is normally done for smaller projects and donations can be solicited in various ways, such as a button on the website, a link in a newsletter, a Github donation, or one that I like - buymeacoffee.com. The latter allows you to embed an option into your website or interface and donate at the value of a coffee. Although donations are a great way to monetize some projects, this method is not feasible for bigger companies that have complex solutions and large overheads.&lt;/p&gt;

&lt;h3&gt;
  
  
  Support​
&lt;/h3&gt;

&lt;p&gt;Paid Support or Premium Care, as it’s commonly termed, is a very common business model that has done very well for larger commercial companies. This model allows users to still access the code and deploy it for free but also enables an option for companies/users to pay for additional support. This monetized plan often includes perks such as help deploying the software, customization and ongoing support for general use. Just because the source code of a project is open, it doesn’t mean it's easy to deploy or manage. This is where companies such as Red Hat have been successful and use this particular model to great effect.&lt;/p&gt;

&lt;p&gt;The benefits of this model are, as Red Hat has demonstrated, you can build a revenue-generating company that can be scaled effectively. The drawback is, some companies only make the open-source code available with a paid plan, which goes against the open-source ethos. To truly use this model effectively, companies should offer the source code for free regardless of an option for additional support.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--LEg16us9--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/christine-roy-ir5MHI6rPg0-unsplash-e0d643aefffdf762ebac0aa4c8f5d78e.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--LEg16us9--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://boxyhq.com/assets/images/christine-roy-ir5MHI6rPg0-unsplash-e0d643aefffdf762ebac0aa4c8f5d78e.jpg" alt="OSS Monetization" width="640" height="428"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Photo by &lt;a href="https://unsplash.com/fr/@agent_illustrateur?utm_source=unsplash&amp;amp;utm_medium=referral&amp;amp;utm_content=creditCopyText"&gt;Christine Roy&lt;/a&gt; on &lt;a href="https://unsplash.com/images/things/money?utm_source=unsplash&amp;amp;utm_medium=referral&amp;amp;utm_content=creditCopyText"&gt;Unsplash&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Licensing​
&lt;/h3&gt;

&lt;p&gt;Open-source companies can also license their open-source software, which applies rules to how their software can be used, edited, distributed and copied. Some open-source companies will allow individuals and smaller organizations to use their software for free while charging larger companies a fee to deploy it. Normally a license fee comes with additional benefits, such as support and training, etc. There are also two main types of licensing that open-source companies can utilize.&lt;/p&gt;

&lt;p&gt;-Copyleft license This is a type of license in which, if code is copied and modified it still retains the original license terms&lt;/p&gt;

&lt;p&gt;-Permissive license This grants licenses based on different needs and is much more diverse.&lt;/p&gt;

&lt;p&gt;Licensing and open-source licensing is a huge topic in itself and Snyk has done a fantastic job at explaining this. You can read more about it here.&lt;/p&gt;

&lt;h3&gt;
  
  
  Cloud-hosted Services​
&lt;/h3&gt;

&lt;p&gt;Finally, the last model we will look at is hosting. While open-source organizations can still offer their code for free, some may offer a hosted version which is much easier to set up and maintain. This means customers can effectively use their product like any other SaaS and they typically charge on a subscription basis.&lt;/p&gt;

&lt;p&gt;The hosted model is very popular as it now allows quick deployment but also reduces the level of maintenance and custom work developers need to carry out. The main limitation of offering a hosted model is, it will require the open-source company to offer web hosting and everything that goes along with it. This can require an enormous amount of maintenance and development.&lt;/p&gt;

&lt;h3&gt;
  
  
  The open-core model​
&lt;/h3&gt;

&lt;p&gt;The open core model is when a company releases the core software for anyone to use but then also controls things such as the roadmap and what commits are accepted into it. By doing this, the company can also charge for extra features which customers may want. Some examples could be functionality features or even security/compliance modules. This model has been very popular with open-source companies and is widely seen as a very fair way to operate. It is also very important to make sure that the open-core has enough value that developers will rally around the product from the get-go. Companies that offer very little value from the free version and charge for additional features, do not see great traction in the open-source community.&lt;/p&gt;

&lt;h2&gt;
  
  
  Controversial opinion​
&lt;/h2&gt;

&lt;p&gt;I personally believe that OSS is not a business model but a development model. We are debating this internally, so we would love to hear your feedback and opinions on this subject.&lt;/p&gt;

&lt;h2&gt;
  
  
  Summary​
&lt;/h2&gt;

&lt;p&gt;Although open-source code is widely free and available to use, it has become a popular choice for companies who also want to commercialize. The benefits of open-source are vast and with the variety of business models we discussed you can understand the various options to create a successful, revenue-generating business.&lt;/p&gt;

</description>
      <category>opensource</category>
    </item>
    <item>
      <title>Why does your SaaS application need audit logs?</title>
      <dc:creator>Deepak Prabhakara</dc:creator>
      <pubDate>Wed, 18 Jan 2023 00:00:00 +0000</pubDate>
      <link>https://dev.to/boxyhq/why-does-your-saas-application-need-audit-logs-2hm7</link>
      <guid>https://dev.to/boxyhq/why-does-your-saas-application-need-audit-logs-2hm7</guid>
      <description>&lt;p&gt;Audit logs are an important tool for keeping track of activity within your SaaS application. These logs provide a detailed record of the actions taken by users and can be used to monitor for potential security breaches, compliance violations, and other issues. Let’s explore some of the key reasons why you need audit logs for your SaaS app.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Compliance:&lt;/strong&gt; Many industries are subject to strict regulations that require organizations to maintain detailed records of their activities. Audit logs can be used to demonstrate compliance with these regulations, and to provide evidence in the event of an audit or investigation.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Cyber Insurance:&lt;/strong&gt; Obtaining cyber insurance usually comes with requirements around recording and retaining audit logs. These logs help with forensics during insurance claims, otherwise making investigation expensive and time-consuming for both insurers and the affected companies.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Security:&lt;/strong&gt; Audit logs can be used to detect and prevent security breaches. By monitoring for suspicious activity, such as repeated failed login attempts or changes to sensitive data, you can quickly identify and respond to potential threats. Additionally, audit logs can be used to reconstruct the events leading up to a security incident, which can help you identify the cause and prevent similar incidents in the future.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Accountability:&lt;/strong&gt; Audit logs make it possible to track the actions of individual users, which can be useful for identifying issues such as data breaches, compliance violations, and other problems. This information can be used to hold users accountable for their actions and to help you identify and address any issues that arise.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Troubleshooting:&lt;/strong&gt; Audit logs can be used to identify and diagnose issues that occur within your SaaS application. By reviewing the logs, you can see exactly what happened when a problem occurred, which can help you quickly identify the root cause and develop a solution.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Auditing:&lt;/strong&gt; Audit logs provide a record of the activities that occur within your SaaS application, which can be useful for internal audits. This information can be used to assess the effectiveness of your security controls and identify areas for improvement.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Gt0AmDxo--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://boxyhq.com/assets/images/audit-logs-widget-4a5818eebf50ad4d8229bbd3684e6667.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Gt0AmDxo--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://boxyhq.com/assets/images/audit-logs-widget-4a5818eebf50ad4d8229bbd3684e6667.png" alt="Audit Logs" width="880" height="681"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Audit logs are a powerful tool that can be used to improve the security, compliance, and overall performance of your SaaS application. By keeping detailed records of user activity, you can monitor for potential issues and quickly respond to problems as they arise. If your SaaS app doesn't have audit logs, you should consider implementing them as soon as possible to ensure the safety and security of your data and users. It is also becoming an important part of enterprise readiness.&lt;/p&gt;

&lt;h2&gt;
  
  
  Introducing our Audit Logs product​
&lt;/h2&gt;

&lt;p&gt;We are extremely thrilled to introduce our new Audit Logs product in collaboration with our friends at &lt;a href="https://replicated.com"&gt;Replicated&lt;/a&gt;. Retraced is a fully open-source audit log service that comes with an embeddable UI that's easily deployed to an infrastructure of your choice. We have spent years building and fine-tuning audit logs systems and think we have finally discovered an optimal solution to this nagging problem.&lt;/p&gt;

&lt;p&gt;It’s yet another important enterprise readiness feature to tick as you scale your offerings to the enterprise segment and complements our Enterprise SSO and Directory Sync products to give you a one-stop solution. Come check out the product at our &lt;a href="https://github.com/retracedhq/retraced"&gt;Github repo&lt;/a&gt;, we’d love to hear your feedback.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>How low-code solutions are changing how we build products and workflows</title>
      <dc:creator>Deepak Prabhakara</dc:creator>
      <pubDate>Tue, 25 Oct 2022 00:00:00 +0000</pubDate>
      <link>https://dev.to/boxyhq/how-low-code-solutions-are-changing-how-we-build-products-and-workflows-2dk0</link>
      <guid>https://dev.to/boxyhq/how-low-code-solutions-are-changing-how-we-build-products-and-workflows-2dk0</guid>
      <description>&lt;p&gt;We have all heard the terms low-code or no-code being thrown around as buzzwords over the last few years but what does this mean and how is it changing the way businesses and individuals solve problems? I am going to use our product SAML Jackson to explain how low-code solutions are changing the way we build products.&lt;/p&gt;

&lt;p&gt;Low-code solutions are essentially products that provide you with building blocks so instead of building a solution from scratch you can simply combine the relevant building blocks to make a relevant solution for your business. Let’s take BoxyHQ and our SAML Jackson product as an example. Without the low-code product (SAML Jackson) the alternative for businesses would be to build a custom SAML integration which takes months and a ton of resources. This sounds ridiculous tho right? With the number of businesses who are deploying SAML for their customer, there must be some reusable parts that can be shared to reduce the time it takes each business. This is where low-code products like SAML Jackson come in. By building the SAML integrations as a reusable component, businesses only need to create one simple connection to the SAML Jackson to deploy SAML.&lt;/p&gt;

&lt;p&gt;Still with me? If not, don't worry. Essentially what low-code is taking advantage of is building in a way that can be shared so the amount of custom building is limited (or low) for common use cases.&lt;/p&gt;

&lt;h2&gt;
  
  
  So what is the difference between low-code and no-code?​
&lt;/h2&gt;

&lt;p&gt;Well while a lot of people would still group them together, the obvious difference is that low-code still needs some code to integrate the building blocks, whereas no-code doesn't. If we look at a product like Zapier for example, that requires no code at all and a non-technical person can use visual blocks to connect different data sources and outputs to build workflows. An example of this is as a non-technical person I can take data from forms such as Hubspot forms that are submitted on our website and create notifications for the team on Slack. Doing all of this without code and just using Zapier is what makes this a no-code solution.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why is low-code so important?​
&lt;/h2&gt;

&lt;p&gt;Lastly, let's take a quick look at the main benefits of having solid DevSecOps in place&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Speed speed speed&lt;/strong&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Cost&lt;/strong&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--zBXfo8u1--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://boxyhq.com/assets/images/lowcode-graph-e2965961a7d07cabf4bccc712e8accdd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--zBXfo8u1--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://boxyhq.com/assets/images/lowcode-graph-e2965961a7d07cabf4bccc712e8accdd.png" alt="DevSecOps" width="640" height="427"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Are there any negatives to using low-code and no-code platforms?​
&lt;/h2&gt;

&lt;p&gt;The only main negative of these solutions I have identified is that because of the ease and speed of the platforms it can create a lack of transparency and some shadow IT as lots of people in the organization can be building solutions and data can be moving around without accountability. However, with the right IT processes and policies in place, this can be easily fixed.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why are we so excited about low-code and no-code?​
&lt;/h2&gt;

&lt;p&gt;We are very excited about low-code solutions because it drives innovation! We at BoxyHQ are building low-code solutions for enterprises to implement the important but standard features they need to be competitive and compliant with ease so they can focus on what they do best which is innovate. We have some great clients already and can’t wait to see what they do next without the hassle of building standard features such as SSO and Directory Sync.&lt;/p&gt;

</description>
      <category>lowcode</category>
      <category>nocode</category>
      <category>speedofdevelopment</category>
    </item>
  </channel>
</rss>
