<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Post-Quantum on Control Plane by Karl McGuinness</title><link>https://notes.karlmcguinness.com/tags/post-quantum/</link><description>Recent content in Post-Quantum on Control Plane by Karl McGuinness</description><generator>Hugo</generator><language>en-us</language><managingEditor>public@karlmcguinness.com (Karl McGuinness)</managingEditor><webMaster>public@karlmcguinness.com (Karl McGuinness)</webMaster><lastBuildDate>Fri, 24 Apr 2026 12:00:00 -0700</lastBuildDate><atom:link href="https://notes.karlmcguinness.com/tags/post-quantum/index.xml" rel="self" type="application/rss+xml"/><item><title>SAML at the Post-Quantum Crossroads</title><link>https://notes.karlmcguinness.com/notes/saml-at-the-post-quantum-crossroads/</link><pubDate>Fri, 24 Apr 2026 12:00:00 -0700</pubDate><author>public@karlmcguinness.com (Karl McGuinness)</author><guid>https://notes.karlmcguinness.com/notes/saml-at-the-post-quantum-crossroads/</guid><description>OpenID Connect is not new, and its core specifications are now international standards. Yet SAML remains the enterprise SSO default because it is familiar, explicit, and deeply deployed. The problem is that XML Signature complexity, aging implementation stacks, and post-quantum migration pressure make SAML harder to defend as the long-term enterprise baseline. The industry needs both a clearer secure OIDC baseline and a credible migration path for existing SAML federations.</description></item></channel></rss>