Multiple hacking techniques allow researchers to bypass XML signature validation while still presenting valid SAML documentation to an application.