FastComments.com

FastComments supports SAML 2.0 authentication for customers on Flex and Pro plans. SAML enables secure single sign-on (SSO) authentication through your organization's identity provider, allowing users to access FastComments using their existing corporate credentials. This guide covers setup, configuration, and troubleshooting of SAML authentication.

What is SAML? Internal Link

SAML (Security Assertion Markup Language) is an XML-based open standard for exchanging authentication and authorization data between parties, particularly between an identity provider (IdP) and a service provider (SP).

How SAML Works

SAML enables single sign-on (SSO) by allowing users to authenticate once with their identity provider and then access multiple applications without re-entering credentials. When a user attempts to access FastComments:

  1. Authentication Request: FastComments redirects the user to your identity provider
  2. User Authentication: The user authenticates with your IdP (e.g., Active Directory, Okta, Azure AD)
  3. SAML Response: The IdP sends a signed SAML assertion back to FastComments
  4. User Access: FastComments validates the assertion and grants access to the authenticated user

Benefits of SAML

  • Enhanced Security: Centralized authentication reduces password-related security risks
  • Improved User Experience: Users sign in once and access multiple applications seamlessly
  • Compliance: Helps meet regulatory requirements for access control and audit trails
  • Administrative Control: IT administrators maintain centralized user management

SAML 2.0 Support

FastComments implements SAML 2.0, the most widely adopted version of the SAML standard. Our implementation supports:

  • HTTP-POST and HTTP-Redirect bindings
  • Signed SAML responses and assertions
  • Encrypted assertions (optional)
  • Multiple signature and digest algorithms
  • Various name identifier formats

SAML vs SSO Internal Link

FastComments offers both SSO and SAML authentication. Understanding the differences helps you choose the right approach for your organization.

Simple/Secure SSO Productions

FastComments offers two different SSO flows for authenticating into the comment widget through your site. This is different from SAML, and does not require SAML. Instead, Simple SSO simply requires passing an object to the comment widget, where Secure SSO does this plus hashing the payload with an API key.

SAML, on the other hand, authenticates the user to the entire product (based on their permissions) as well as the comment widget (if they have third party cookies enabled for our domain).

SAML Authentication

SAML is an enterprise-grade authentication protocol that provides more robust security and integration capabilities:

  • Implementation: Requires Identity Provider (IdP) configuration and certificate exchange
  • Security: Uses signed XML assertions and supports encryption
  • Use Case: Ideal for enterprises with existing SAML infrastructure (Active Directory, Okta, etc.)
  • Setup Complexity: More involved - requires IdP configuration and certificate management
  • Enterprise Features: Advanced role mapping, centralized user management, audit trails

When to Choose SAML

Consider SAML authentication if your organization:

  • Already uses a SAML-compatible identity provider (Okta, Azure AD, ADFS, etc.)
  • Requires enterprise-grade security and compliance
  • Needs centralized user management and access control
  • Has multiple applications using SAML for authentication
  • Requires detailed audit trails and security reporting

When to Choose Simple or Secure SSO

Our widget-focused SSO solutions might be sufficient if you:

  • Have a custom authentication system
  • Need quick implementation with minimal setup
  • Don't require enterprise identity provider integration
  • Want to control user data directly from your application
  • Have simpler security requirements

Simple and Secure SSO are commonly used for online portals, blogs, etc, where the user already has an account through your site or app but doesn't necessarily use SAML.

User Roles and Permissions Internal Link

FastComments maps SAML user roles to internal permissions, enabling role-based access control for your organization.

FastComments Role System

FastComments uses a role-based permission system where users can have one or more roles that determine their access levels and capabilities.

Available FastComments Roles

Administrative Roles

fc-account-owner

  • Permissions: Complete administrative access
  • Capabilities: All features, billing management, user management
  • Use Case: Primary account administrators and owners

fc-admin-admin

  • Permissions: Administrative access to most features
  • Capabilities: User management, configuration, moderation. Can administer other admins.
  • Use Case: Secondary administrators and IT staff

fc-billing-admin

  • Permissions: Billing and subscription management
  • Capabilities: Payment methods, invoices, subscription changes
  • Use Case: Finance team members and billing contacts

Specialized Roles

fc-analytics-admin

  • Permissions: Access to analytics and reporting
  • Capabilities: View site statistics, user engagement data
  • Use Case: Marketing teams and data analysts

fc-api-admin

  • Permissions: API access and management
  • Capabilities: API credentials, webhook configuration
  • Use Case: Developers and technical integrators

fc-moderator

  • Permissions: Comment moderation capabilities
  • Capabilities: Approve/reject comments, manage spam
  • Use Case: Community moderators and content managers

Role Mapping Configuration

SAML Attribute Sources

FastComments accepts role information from various SAML attribute names to ensure compatibility with different identity providers:

Standard Attribute Names:

  • roles
  • groups
  • memberOf
  • role
  • group

Microsoft/ADFS Attributes:

  • http://schemas.microsoft.com/ws/2008/06/identity/claims/role
  • http://schemas.xmlsoap.org/ws/2005/05/identity/claims/role

Role Format Support

Array Format (Preferred):

<saml:Attribute Name="roles">
    <saml:AttributeValue>fc-admin-admin</saml:AttributeValue>
    <saml:AttributeValue>fc-moderator</saml:AttributeValue>
</saml:Attribute>

Comma-Separated Format:

<saml:Attribute Name="roles">
    <saml:AttributeValue>fc-admin-admin,fc-moderator</saml:AttributeValue>
</saml:Attribute>

Single Role Format:

<saml:Attribute Name="roles">
    <saml:AttributeValue>fc-admin-admin</saml:AttributeValue>
</saml:Attribute>

Identity Provider Role Configuration

Microsoft Azure AD

  1. App Roles Configuration:

    • Define FastComments roles in your Azure AD application
    • Assign users to appropriate app roles
    • Configure claims to include assigned roles
  2. Attribute Mapping:

    Attribute Name: roles
    Source Attribute: user.assignedroles

Okta

  1. Group Assignment:

    • Create groups matching FastComments role names
    • Assign users to appropriate groups
    • Configure attribute statements
  2. Attribute Statement:

    Name: roles
    Value: user.groups
    Filter: Starts with "fc-"

Google Workspace

  1. Group Mapping:

    • Create organizational units or groups
    • Name groups with FastComments role prefixes
    • Configure attribute mapping
  2. Custom Attributes:

    Attribute Name: roles
    Value: Groups or custom schema attribute

Default User Behavior

Users Without Roles

When a SAML user has no roles or unrecognized roles:

  • User is created as a standard commenter
  • No administrative access is granted
  • Can post and manage their own comments
  • Cannot access admin dashboard features

Role Inheritance

  • Users can have multiple roles simultaneously
  • Permissions are cumulative (highest permission level applies)
  • Role changes in IdP are reflected on next login

Managing SAML Users

User Creation

When a user logs in via SAML for the first time:

  1. User Account: Automatically created with email as identifier
  2. Role Assignment: Roles applied based on SAML attributes
  3. Profile Information: First/last name populated if provided
  4. Permission Activation: Roles become active immediately

Role Updates

Existing SAML users receive role updates:

  1. Login Trigger: Role updates occur during each SAML login
  2. Immediate Effect: New permissions apply immediately
  3. Role Removal: Removed roles are revoked automatically
  4. Audit Trail: Role changes are logged in audit logs

Custom Role Mapping

Enterprise Customization

For enterprise customers with specific requirements:

  • Custom role names can be mapped to FastComments permissions
  • Complex role hierarchies can be implemented
  • Department-specific access controls can be configured

Contact FastComments support for custom role mapping configurations.

Role Validation

FastComments validates incoming roles:

  • Unrecognized roles are ignored (not rejected)
  • Malformed role attributes are logged for troubleshooting
  • Users maintain existing roles if SAML assertion lacks role information

Best Practices

Role Management

  1. Principle of Least Privilege: Assign minimal necessary permissions
  2. Regular Auditing: Review user roles and access periodically
  3. Clear Naming: Use descriptive group names in your IdP
  4. Documentation: Maintain documentation of role assignments

Security Considerations

  1. Role Attributes: Ensure role attributes are properly secured in SAML responses
  2. Attribute Validation: Verify that only authorized systems can assign roles
  3. Access Reviews: Regularly review administrative role assignments
  4. Monitoring: Monitor role changes and administrative actions

Troubleshooting Role Issues

Common Problems

Roles Not Applied:

  • Check SAML attribute names match supported formats
  • Verify IdP is sending role information
  • Confirm role values match FastComments role names exactly

Access Denied:

  • Verify user has appropriate role assigned in IdP
  • Check role spelling and case sensitivity
  • Confirm role is properly formatted in SAML response

Missing Permissions:

  • Review role definitions and required permissions
  • Check for conflicting role assignments
  • Verify user has logged in after role changes

Security Best Practices Internal Link

SAML implementation security is critical for protecting your organization's authentication infrastructure and user data.

SAML Security Fundamentals

Digital Signatures

SAML Response Signing:

  • All SAML responses must be digitally signed by the IdP
  • FastComments validates signatures using the IdP's public certificate
  • Prevents tampering with authentication assertions
  • Ensures responses originate from trusted IdP

Certificate Validation:

  • Certificates are validated against configured IdP certificate
  • Certificate chain validation ensures trust hierarchy
  • Expired or invalid certificates are rejected
  • Certificate rotation should be planned and coordinated

Assertion Security

Audience Restriction:

  • SAML assertions include audience restriction (SP Entity ID)
  • Prevents assertion replay attacks against other service providers
  • FastComments validates audience matches tenant configuration
  • Reject assertions intended for other applications

Time-Based Validation:

  • Assertions include time-based validity windows
  • NotBefore and NotOnOrAfter conditions are enforced
  • Prevents replay of old assertions
  • Clock skew tolerance is configurable

Communication Security

Transport Layer Security

HTTPS Requirements:

  • All SAML communication occurs over HTTPS
  • TLS 1.2 or higher is required
  • Certificate validation prevents man-in-the-middle attacks
  • Secure communication protects sensitive authentication data

Endpoint Security:

  • SAML endpoints use secure, authenticated connections
  • IdP and SP endpoints must support modern TLS
  • Weak cipher suites are rejected
  • Certificate pinning may be implemented for additional security

Data Protection

Sensitive Data Handling:

  • SAML assertions may contain sensitive user information
  • Data is encrypted in transit and processed securely
  • Temporary storage is minimized and secured
  • User data retention follows privacy requirements

Assertion Encryption (Optional):

  • SAML assertions can be encrypted for additional security
  • Useful when assertions traverse untrusted networks
  • Requires private key configuration in FastComments
  • Most deployments rely on TLS encryption instead

Authentication Security

Single Sign-On Benefits

Centralized Authentication:

  • Reduces password-related security risks
  • Enables consistent security policies
  • Provides single point for access control
  • Facilitates compliance with security standards

Session Management:

  • SAML enables secure session establishment
  • Session timeouts can be centrally managed
  • Single logout capabilities (if supported by IdP)
  • Reduces credential exposure across applications

Multi-Factor Authentication

IdP MFA Integration:

  • MFA requirements enforced by identity provider
  • FastComments inherits IdP security policies
  • Supports various MFA methods (SMS, authenticator apps, hardware tokens)
  • Centralized MFA policy management

Access Control Security

Role-Based Access Control

Principle of Least Privilege:

  • Assign minimum necessary permissions to users
  • Use specific roles rather than overly broad permissions
  • Regular review of role assignments
  • Remove access when no longer needed

Role Validation:

  • SAML role attributes are validated and sanitized
  • Unknown roles are ignored (not rejected)
  • Role changes are applied immediately upon login
  • Audit trail maintained for role changes

Administrative Access

Admin Role Protection:

  • Administrative roles require explicit assignment
  • Monitor administrative access and activities
  • Implement approval workflows for sensitive role assignments
  • Regular auditing of administrative accounts

Identity Provider Security

IdP Configuration Security

Certificate Management:

  • Use strong certificates (RSA-2048 or higher)
  • Implement proper certificate rotation procedures
  • Secure private key storage at IdP
  • Monitor certificate expiration dates

Access Control:

  • Restrict who can modify SAML application configuration
  • Implement approval processes for configuration changes
  • Monitor configuration changes and access
  • Regular security reviews of IdP configuration

Attribute Security

Sensitive Attribute Protection:

  • Minimize sensitive data in SAML attributes
  • Use role identifiers rather than sensitive group names
  • Encrypt assertions containing sensitive information
  • Follow data minimization principles

Attribute Validation:

  • Validate all incoming SAML attributes
  • Sanitize attribute values to prevent injection attacks
  • Implement attribute value restrictions where appropriate
  • Log suspicious or malformed attributes

Monitoring and Auditing

Authentication Monitoring

Failed Authentication Tracking:

  • Monitor failed SAML authentication attempts
  • Alert on unusual authentication patterns
  • Track certificate validation failures
  • Log configuration-related errors

Success Monitoring:

  • Monitor successful authentication rates
  • Track user role assignments and changes
  • Verify normal authentication flow timing
  • Monitor for unexpected user creation

Security Event Logging

Audit Trail Maintenance:

  • Log all SAML authentication events
  • Maintain records of configuration changes
  • Track administrative actions and access
  • Store logs securely with tamper protection

Alert Configuration:

  • Set up alerts for security-relevant events
  • Monitor for certificate expiration
  • Alert on repeated authentication failures
  • Notify of unusual administrative activity

Compliance Considerations

Data Privacy

User Data Protection:

  • Follow GDPR, CCPA, and relevant privacy regulations
  • Minimize personal data collection and processing
  • Provide user control over personal information
  • Implement data retention and deletion policies

Cross-Border Data Transfer:

  • Consider data residency requirements
  • Implement appropriate safeguards for international transfers
  • Document data flows between IdP and FastComments
  • Ensure compliance with local privacy laws

Security Standards

Industry Standards Compliance:

  • Follow SAML 2.0 security best practices
  • Implement NIST authentication guidelines
  • Consider SOC 2 and ISO 27001 requirements
  • Regular security assessments and penetration testing

Incident Response

Security Incident Procedures

Breach Response:

  • Immediate containment of security incidents
  • Notification of affected parties
  • Investigation and root cause analysis
  • Implementation of corrective measures

Certificate Compromise:

  • Immediate revocation of compromised certificates
  • Emergency certificate rotation procedures
  • User notification and re-authentication requirements
  • Security review and strengthening measures

Business Continuity

Backup Authentication Methods:

  • Maintain alternative authentication methods
  • Document emergency access procedures
  • Regular testing of backup authentication
  • Clear communication during outages

Disaster Recovery:

  • Document SAML configuration for disaster recovery
  • Maintain copies of certificates and configuration
  • Test recovery procedures regularly
  • Coordinate with IdP disaster recovery plans

Security Best Practices Summary

Implementation Security

  1. Use Strong Certificates: RSA-2048 or higher with proper validation
  2. Enforce HTTPS: All communication over secure, encrypted channels
  3. Validate All Input: Sanitize and validate all SAML attributes
  4. Monitor Continuously: Implement comprehensive monitoring and alerting
  5. Regular Reviews: Conduct periodic security reviews and updates

Operational Security

  1. Principle of Least Privilege: Assign minimal necessary permissions
  2. Regular Auditing: Review access, roles, and configurations regularly
  3. Documentation: Maintain current security documentation
  4. Training: Ensure staff understand SAML security requirements
  5. Incident Preparedness: Have incident response procedures ready

Organizational Security

  1. Change Management: Implement controlled change processes
  2. Separation of Duties: Divide administrative responsibilities
  3. Regular Updates: Keep all systems and certificates current
  4. Vendor Management: Monitor security of IdP and related services
  5. Compliance Monitoring: Ensure ongoing compliance with regulations

SAML authentication provides enterprise-grade security and seamless user experience for FastComments users. With proper configuration and testing, SAML enables secure single sign-on that integrates with your existing identity infrastructure while maintaining strong security controls and comprehensive audit capabilities.