Digital Theatre+ is not affected by the Shibboleth Service Provider or OpenSAML-C++ security advisories.
Is Digital Theatre+ affected by the Shibboleth Service Provider and OpenSAML-C++ security advisories?
No. Digital Theatre+ is not affected by the vulnerability described in the Shibboleth Service Provider and OpenSAML-C++ security advisories from March 13, 2025. These advisories warn of a critical flaw in Shibboleth’s SAML software (the OpenSAML library) that could allow forged authentication messages.
Digital Theatre+ does not use the Shibboleth Service Provider software or the OpenSAML-C++ library in our platform, so this issue does not impact our services. In short, the vulnerability is not present in Digital Theatre+’s single sign-on (SSO) implementation.
Why is Digital Theatre+ not affected by these SAML vulnerabilities?
Digital Theatre+ uses Okta as our SAML identity platform instead of running a Shibboleth Service Provider.
This means we do not rely on the vulnerable OpenSAML-C++ software at all. Okta’s platform is not impacted by the Shibboleth/OpenSAML flaw, so our SSO integration remains secure.
Because we have no Shibboleth or OpenSAML components in our login infrastructure, the critical SAML issue simply does not apply to Digital Theatre+.
Do I need to take any action or worry about my Digital Theatre+ SSO integration?
No action is required on your part for Digital Theatre+ SSO. You can continue to use Digital Theatre+ as usual, confident that the Shibboleth/OpenSAML vulnerability does not affect your access to our platform.
The Digital Theatre+ system remains secure, and there are no changes needed in your SSO configuration with Digital Theatre+.
If your organization independently uses Shibboleth or similar SAML software for other services, you should follow the advisory’s guidance for those systems, but nothing is needed for Digital Theatre+.