<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Enterprise SSO on Control Plane by Karl McGuinness</title><link>https://notes.karlmcguinness.com/tags/enterprise-sso/</link><description>Recent content in Enterprise SSO on Control Plane by Karl McGuinness</description><generator>Hugo</generator><language>en-us</language><managingEditor>public@karlmcguinness.com (Karl McGuinness)</managingEditor><webMaster>public@karlmcguinness.com (Karl McGuinness)</webMaster><lastBuildDate>Fri, 24 Apr 2026 12:00:00 -0700</lastBuildDate><atom:link href="https://notes.karlmcguinness.com/tags/enterprise-sso/index.xml" rel="self" type="application/rss+xml"/><item><title>SAML at the Post-Quantum Crossroads</title><link>https://notes.karlmcguinness.com/notes/saml-at-the-post-quantum-crossroads/</link><pubDate>Fri, 24 Apr 2026 12:00:00 -0700</pubDate><author>public@karlmcguinness.com (Karl McGuinness)</author><guid>https://notes.karlmcguinness.com/notes/saml-at-the-post-quantum-crossroads/</guid><description>OpenID Connect is not new, and its core specifications are now international standards. Yet SAML remains the enterprise SSO default because it is familiar, explicit, and deeply deployed. The problem is that XML Signature complexity, aging implementation stacks, and post-quantum migration pressure make SAML harder to defend as the long-term enterprise baseline. The industry needs both a clearer secure OIDC baseline and a credible migration path for existing SAML federations.</description></item></channel></rss>