SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
Single Sign On – The Basics
Ishan A B Ambanwela
Contents
● What is SSO
● Not to be Confused with
● Pros & Cons
● SSO Approaches – By Configuration
● Types of SSO
– Legacy SSO
– Password Synchronization
– Software Token Based Authentication
● Browser Session
● PC Login session
– Mobile SSO
● Q&A
What is SSO
● Single sign-on gives users the ability to access
more than one protected resource (Web
pages and applications) with one
authentication.
Not to be Confused with...
● Authentication vs Authorization
● Shared authentication schemes
– Oauth
– OpenID / OpenID Connect
– Facebook Connect
● Single Sign Out
Pros & Cons
● Reduced operational cost
● Reduced time to access data
● Improved user experience
● Ease burden on developers
● Centralized management of
users
● Fine grained auditing
● Effective compliance
● Advanced security to systems
– Smart cards, One time password
tokens
● impractical in different levels
of secure access
● increases the negative impact
in case of credentials exposed
● makes the authentication
systems highly critical
● Complex logics and pitfalls
● Should combined with strong
authentication methods
– Smart cards, One time
password tokens
SSO Approaches – By Configuration
● Smart card based
● Kerberos based
● SAML (Security Assertion Markup Language)
● Integrated Windows Authentication
– An umbrella term for
● SPNEGO, Kerberos, and NTLMSSP
Types of SSO
● Legacy SSO
● Password synchronization
● Software Token Based Authentication
Legacy SSO
● aka - Enterprise or Employee SSO (eSSO)
● After primary authentication, it intercepts further login prompts
and fills them for you
● Which is accomplished using
– Script
● Which executes the real application with credentials
– Background service
● Monitors for login prompts and pass credentials
● Products/Implementations
– Citrix Password Manager, Imprivata eSSO appliance, PassLogix,
Novell’s Secure Login
Password Synchronization
● A process that coordinates passwords across
multiple computers and devices and/or
applications
● Each computer, device, application still
authenticates but behind the scene
● Products/Implementations
– MTech's P-Synch, Proginet's SecurPass, Systor's
SAM Password Synchronization
Software Token Based
Authentication
● Allow users to enter their username and password in order
to obtain a token
● Once their token has been obtained, the user can offer the
token - which offers access to a specific resource for a time
period - to the remote site instead of credentials
● Complex encryption with complex logic differentiates the
implementations
● Usually associated with a session
– Web SSO - Browser session
– Other SSO - PC Log in session
Web SSO
● Works for browser based applications
● Cookie support is required
– Because token is kept in a cookie
● Usually single sign-on to applications deployed
on a single web server (domain)
● Implementations
– Jasig CAS
PC Login session based SSO
● Works for all kinds of applications
– Mail clients
– Web applications
● Token is kept in user session
● Client application should implement this feature
● Implementations
– Some Kerberos implementations
– NTLM
Mobile SSO
● Since Mobile Phone/Tab is a strictly personal
device, SSO has not very significant role
● Can save all different passwords like in Legacy
SSO
● As technology is getting complicated, SSO will
be introduced in near future
Q & A
References
● https://www.owasp.org/images/2/26/OWASPSa
nAntonio_2006_08_SingleSignOn.ppt
● http://www.jasig.org/cas/protocol
● http://web.mit.edu/kerberos/
● Various SSO products pages
Thank you and Good luck :-)

Más contenido relacionado

La actualidad más candente

Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?ForgeRock
 
What is SSO? An introduction to Single Sign On
What is SSO? An introduction to Single Sign OnWhat is SSO? An introduction to Single Sign On
What is SSO? An introduction to Single Sign OnRiddhi Sood
 
Introduction to SAML 2.0
Introduction to SAML 2.0Introduction to SAML 2.0
Introduction to SAML 2.0Mika Koivisto
 
OAuth2 - Introduction
OAuth2 - IntroductionOAuth2 - Introduction
OAuth2 - IntroductionKnoldus Inc.
 
Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...
Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...
Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...FIDO Alliance
 
SAML Protocol Overview
SAML Protocol OverviewSAML Protocol Overview
SAML Protocol OverviewMike Schwartz
 
System hardening - OS and Application
System hardening - OS and ApplicationSystem hardening - OS and Application
System hardening - OS and Applicationedavid2685
 
OAuth 2.0 and OpenId Connect
OAuth 2.0 and OpenId ConnectOAuth 2.0 and OpenId Connect
OAuth 2.0 and OpenId ConnectSaran Doraiswamy
 
Enterprise single sign on
Enterprise single sign onEnterprise single sign on
Enterprise single sign onArchit Sharma
 
Single Sign On - Case Study
Single Sign On - Case StudySingle Sign On - Case Study
Single Sign On - Case StudyEbizon
 
OpenID Connect: An Overview
OpenID Connect: An OverviewOpenID Connect: An Overview
OpenID Connect: An OverviewPat Patterson
 
An Introduction to OAuth2
An Introduction to OAuth2An Introduction to OAuth2
An Introduction to OAuth2Aaron Parecki
 
OAuth & OpenID Connect Deep Dive
OAuth & OpenID Connect Deep DiveOAuth & OpenID Connect Deep Dive
OAuth & OpenID Connect Deep DiveNordic APIs
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating systemAbou Bakr Ashraf
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testingAbu Sadat Mohammed Yasin
 

La actualidad más candente (20)

Single Sign On Considerations
Single Sign On ConsiderationsSingle Sign On Considerations
Single Sign On Considerations
 
Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?
 
What is SSO? An introduction to Single Sign On
What is SSO? An introduction to Single Sign OnWhat is SSO? An introduction to Single Sign On
What is SSO? An introduction to Single Sign On
 
Introduction to SAML 2.0
Introduction to SAML 2.0Introduction to SAML 2.0
Introduction to SAML 2.0
 
Single Sign-On Best Practices
Single Sign-On Best PracticesSingle Sign-On Best Practices
Single Sign-On Best Practices
 
OAuth2 - Introduction
OAuth2 - IntroductionOAuth2 - Introduction
OAuth2 - Introduction
 
IdP, SAML, OAuth
IdP, SAML, OAuthIdP, SAML, OAuth
IdP, SAML, OAuth
 
Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...
Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...
Microsoft's Path to Passwordless - FIDO Authentication for Windows & Azure Ac...
 
SAML Protocol Overview
SAML Protocol OverviewSAML Protocol Overview
SAML Protocol Overview
 
System hardening - OS and Application
System hardening - OS and ApplicationSystem hardening - OS and Application
System hardening - OS and Application
 
OAuth 2.0 and OpenId Connect
OAuth 2.0 and OpenId ConnectOAuth 2.0 and OpenId Connect
OAuth 2.0 and OpenId Connect
 
Enterprise single sign on
Enterprise single sign onEnterprise single sign on
Enterprise single sign on
 
Single Sign On - Case Study
Single Sign On - Case StudySingle Sign On - Case Study
Single Sign On - Case Study
 
OpenID Connect: An Overview
OpenID Connect: An OverviewOpenID Connect: An Overview
OpenID Connect: An Overview
 
An Introduction to OAuth2
An Introduction to OAuth2An Introduction to OAuth2
An Introduction to OAuth2
 
OAuth 2.0
OAuth 2.0OAuth 2.0
OAuth 2.0
 
Secure Code Review 101
Secure Code Review 101Secure Code Review 101
Secure Code Review 101
 
OAuth & OpenID Connect Deep Dive
OAuth & OpenID Connect Deep DiveOAuth & OpenID Connect Deep Dive
OAuth & OpenID Connect Deep Dive
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating system
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 

Destacado

Pharmaceutical e-Marketing v2.0
Pharmaceutical e-Marketing v2.0Pharmaceutical e-Marketing v2.0
Pharmaceutical e-Marketing v2.0Jean-Luc Caut
 
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-onFast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-onCraig Dickson
 
Setting up the To Do Module
Setting up the To Do ModuleSetting up the To Do Module
Setting up the To Do ModuleMichael Payne
 
Hadoop - Overview
Hadoop - OverviewHadoop - Overview
Hadoop - OverviewJay
 
IT Strategy Development Process
IT Strategy Development ProcessIT Strategy Development Process
IT Strategy Development ProcessRobert Moores
 
Plants adaptations presentation for kids
Plants adaptations presentation for kidsPlants adaptations presentation for kids
Plants adaptations presentation for kidsVerónica Estapé
 
Top 10 tech support manager interview questions and answers
Top 10 tech support manager interview questions and answersTop 10 tech support manager interview questions and answers
Top 10 tech support manager interview questions and answersmarcdanny68
 
Top 10 project officer interview questions and answers pdf
Top 10 project officer interview questions and answers pdfTop 10 project officer interview questions and answers pdf
Top 10 project officer interview questions and answers pdfHelenMirren123
 
Training Program Presentation
Training Program PresentationTraining Program Presentation
Training Program PresentationStacey Troup
 
Retail Brand Development. Challenges and Opportunities - a Russian Perspective
Retail Brand Development. Challenges and Opportunities - a Russian PerspectiveRetail Brand Development. Challenges and Opportunities - a Russian Perspective
Retail Brand Development. Challenges and Opportunities - a Russian PerspectiveSCG International
 
Electrical Pressure Measuring Devices
Electrical Pressure Measuring DevicesElectrical Pressure Measuring Devices
Electrical Pressure Measuring DevicesMaria Romina Angustia
 
Transcription & Translation
Transcription & TranslationTranscription & Translation
Transcription & TranslationCrystal Wood
 
SOLID DISPERSION TECHNIQUE
SOLID DISPERSION TECHNIQUESOLID DISPERSION TECHNIQUE
SOLID DISPERSION TECHNIQUERahul Pandit
 
Thermistor Temperature Sensors
Thermistor Temperature SensorsThermistor Temperature Sensors
Thermistor Temperature SensorsDwyer Instruments
 
Gas chromatography and its instrumentation
Gas chromatography and its instrumentationGas chromatography and its instrumentation
Gas chromatography and its instrumentationArgha Sen
 
Febrile neutropenia
Febrile neutropeniaFebrile neutropenia
Febrile neutropeniaAhmed Allam
 

Destacado (18)

Single sign on
Single sign onSingle sign on
Single sign on
 
Pharmaceutical e-Marketing v2.0
Pharmaceutical e-Marketing v2.0Pharmaceutical e-Marketing v2.0
Pharmaceutical e-Marketing v2.0
 
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-onFast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
 
Setting up the To Do Module
Setting up the To Do ModuleSetting up the To Do Module
Setting up the To Do Module
 
Hadoop - Overview
Hadoop - OverviewHadoop - Overview
Hadoop - Overview
 
IT Strategy Development Process
IT Strategy Development ProcessIT Strategy Development Process
IT Strategy Development Process
 
Home exam answers
Home exam answersHome exam answers
Home exam answers
 
Plants adaptations presentation for kids
Plants adaptations presentation for kidsPlants adaptations presentation for kids
Plants adaptations presentation for kids
 
Top 10 tech support manager interview questions and answers
Top 10 tech support manager interview questions and answersTop 10 tech support manager interview questions and answers
Top 10 tech support manager interview questions and answers
 
Top 10 project officer interview questions and answers pdf
Top 10 project officer interview questions and answers pdfTop 10 project officer interview questions and answers pdf
Top 10 project officer interview questions and answers pdf
 
Training Program Presentation
Training Program PresentationTraining Program Presentation
Training Program Presentation
 
Retail Brand Development. Challenges and Opportunities - a Russian Perspective
Retail Brand Development. Challenges and Opportunities - a Russian PerspectiveRetail Brand Development. Challenges and Opportunities - a Russian Perspective
Retail Brand Development. Challenges and Opportunities - a Russian Perspective
 
Electrical Pressure Measuring Devices
Electrical Pressure Measuring DevicesElectrical Pressure Measuring Devices
Electrical Pressure Measuring Devices
 
Transcription & Translation
Transcription & TranslationTranscription & Translation
Transcription & Translation
 
SOLID DISPERSION TECHNIQUE
SOLID DISPERSION TECHNIQUESOLID DISPERSION TECHNIQUE
SOLID DISPERSION TECHNIQUE
 
Thermistor Temperature Sensors
Thermistor Temperature SensorsThermistor Temperature Sensors
Thermistor Temperature Sensors
 
Gas chromatography and its instrumentation
Gas chromatography and its instrumentationGas chromatography and its instrumentation
Gas chromatography and its instrumentation
 
Febrile neutropenia
Febrile neutropeniaFebrile neutropenia
Febrile neutropenia
 

Similar a Single Sign On - The Basics

Why you should use true single-sign-on in Icinga Web 2 - Icinga Camp Stockhol...
Why you should use true single-sign-on in Icinga Web 2 - Icinga Camp Stockhol...Why you should use true single-sign-on in Icinga Web 2 - Icinga Camp Stockhol...
Why you should use true single-sign-on in Icinga Web 2 - Icinga Camp Stockhol...Icinga
 
Tdp ws trust
Tdp   ws trustTdp   ws trust
Tdp ws trustGWAVA
 
SSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementSSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementManish Harsh
 
Implementation of Single Sign On (SSO) Technology Using SAML Standards At U...
Implementation of Single Sign On (SSO) Technology  Using SAML Standards  At U...Implementation of Single Sign On (SSO) Technology  Using SAML Standards  At U...
Implementation of Single Sign On (SSO) Technology Using SAML Standards At U...irawan afrianto
 
Single sign on assistant an authentication brokers
Single sign on assistant an authentication brokersSingle sign on assistant an authentication brokers
Single sign on assistant an authentication brokersFinalyear Projects
 
Anonymous Individual Integration for IoT
Anonymous Individual Integration for IoTAnonymous Individual Integration for IoT
Anonymous Individual Integration for IoTPaul Fremantle
 
sso_on_new system with security is more concern
sso_on_new system with security is more concernsso_on_new system with security is more concern
sso_on_new system with security is more concern2022mt93375
 
IoT mobile app device cloud identity and security architecture
IoT mobile app device cloud identity and security architectureIoT mobile app device cloud identity and security architecture
IoT mobile app device cloud identity and security architectureVinod Wilson
 
2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity
2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity
2022 APIsecure_Passwordless Multi-factor Authentication Security and IdentityAPIsecure_ Official
 
implement authentication mechanisms
implement authentication mechanismsimplement authentication mechanisms
implement authentication mechanismsAlireza Ghahrood
 
ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016  ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016 ForgeRock
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsMaxim Salnikov
 
Webinar: Talking to Devices - The Importance of a Comprehensive Internet of T...
Webinar: Talking to Devices - The Importance of a Comprehensive Internet of T...Webinar: Talking to Devices - The Importance of a Comprehensive Internet of T...
Webinar: Talking to Devices - The Importance of a Comprehensive Internet of T...WSO2
 
Choosing the Best Business Intelligence Security Model for Your App
Choosing the Best Business Intelligence Security Model for Your AppChoosing the Best Business Intelligence Security Model for Your App
Choosing the Best Business Intelligence Security Model for Your AppLogi Analytics
 
Securing ap is oauth and fine grained access control
Securing ap is   oauth and fine grained access controlSecuring ap is   oauth and fine grained access control
Securing ap is oauth and fine grained access controlAaronLieberman5
 
Mobile Authentication - Moving Towards a Passwordless Future
Mobile Authentication - Moving Towards a Passwordless FutureMobile Authentication - Moving Towards a Passwordless Future
Mobile Authentication - Moving Towards a Passwordless FutureForgeRock Identity Tech Talks
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserverMicro Focus
 
Safenet Authentication Service, SAS
Safenet Authentication Service, SASSafenet Authentication Service, SAS
Safenet Authentication Service, SASrobbuddingh
 

Similar a Single Sign On - The Basics (20)

Why you should use true single-sign-on in Icinga Web 2 - Icinga Camp Stockhol...
Why you should use true single-sign-on in Icinga Web 2 - Icinga Camp Stockhol...Why you should use true single-sign-on in Icinga Web 2 - Icinga Camp Stockhol...
Why you should use true single-sign-on in Icinga Web 2 - Icinga Camp Stockhol...
 
Tdp ws trust
Tdp   ws trustTdp   ws trust
Tdp ws trust
 
SSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementSSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy Management
 
OWASP Top 10 Proactive Control 2016 (C5-C10)
OWASP Top 10 Proactive Control 2016 (C5-C10)OWASP Top 10 Proactive Control 2016 (C5-C10)
OWASP Top 10 Proactive Control 2016 (C5-C10)
 
Implementation of Single Sign On (SSO) Technology Using SAML Standards At U...
Implementation of Single Sign On (SSO) Technology  Using SAML Standards  At U...Implementation of Single Sign On (SSO) Technology  Using SAML Standards  At U...
Implementation of Single Sign On (SSO) Technology Using SAML Standards At U...
 
Single sign on assistant an authentication brokers
Single sign on assistant an authentication brokersSingle sign on assistant an authentication brokers
Single sign on assistant an authentication brokers
 
Anonymous Individual Integration for IoT
Anonymous Individual Integration for IoTAnonymous Individual Integration for IoT
Anonymous Individual Integration for IoT
 
sso_on_new system with security is more concern
sso_on_new system with security is more concernsso_on_new system with security is more concern
sso_on_new system with security is more concern
 
IoT mobile app device cloud identity and security architecture
IoT mobile app device cloud identity and security architectureIoT mobile app device cloud identity and security architecture
IoT mobile app device cloud identity and security architecture
 
2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity
2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity
2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity
 
implement authentication mechanisms
implement authentication mechanismsimplement authentication mechanisms
implement authentication mechanisms
 
ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016  ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
 
Webinar: Talking to Devices - The Importance of a Comprehensive Internet of T...
Webinar: Talking to Devices - The Importance of a Comprehensive Internet of T...Webinar: Talking to Devices - The Importance of a Comprehensive Internet of T...
Webinar: Talking to Devices - The Importance of a Comprehensive Internet of T...
 
Choosing the Best Business Intelligence Security Model for Your App
Choosing the Best Business Intelligence Security Model for Your AppChoosing the Best Business Intelligence Security Model for Your App
Choosing the Best Business Intelligence Security Model for Your App
 
Securing ap is oauth and fine grained access control
Securing ap is   oauth and fine grained access controlSecuring ap is   oauth and fine grained access control
Securing ap is oauth and fine grained access control
 
Mobile Authentication - Moving Towards a Passwordless Future
Mobile Authentication - Moving Towards a Passwordless FutureMobile Authentication - Moving Towards a Passwordless Future
Mobile Authentication - Moving Towards a Passwordless Future
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
 
Safenet Authentication Service, SAS
Safenet Authentication Service, SASSafenet Authentication Service, SAS
Safenet Authentication Service, SAS
 

Último

WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfonteinmasabamasaba
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplatePresentation.STUDIO
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...SelfMade bd
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...masabamasaba
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in sowetomasabamasaba
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...masabamasaba
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyviewmasabamasaba
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park masabamasaba
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024VictoriaMetrics
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfonteinmasabamasaba
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...masabamasaba
 

Último (20)

WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 

Single Sign On - The Basics

  • 1. Single Sign On – The Basics Ishan A B Ambanwela
  • 2. Contents ● What is SSO ● Not to be Confused with ● Pros & Cons ● SSO Approaches – By Configuration ● Types of SSO – Legacy SSO – Password Synchronization – Software Token Based Authentication ● Browser Session ● PC Login session – Mobile SSO ● Q&A
  • 3. What is SSO ● Single sign-on gives users the ability to access more than one protected resource (Web pages and applications) with one authentication.
  • 4. Not to be Confused with... ● Authentication vs Authorization ● Shared authentication schemes – Oauth – OpenID / OpenID Connect – Facebook Connect ● Single Sign Out
  • 5. Pros & Cons ● Reduced operational cost ● Reduced time to access data ● Improved user experience ● Ease burden on developers ● Centralized management of users ● Fine grained auditing ● Effective compliance ● Advanced security to systems – Smart cards, One time password tokens ● impractical in different levels of secure access ● increases the negative impact in case of credentials exposed ● makes the authentication systems highly critical ● Complex logics and pitfalls ● Should combined with strong authentication methods – Smart cards, One time password tokens
  • 6. SSO Approaches – By Configuration ● Smart card based ● Kerberos based ● SAML (Security Assertion Markup Language) ● Integrated Windows Authentication – An umbrella term for ● SPNEGO, Kerberos, and NTLMSSP
  • 7. Types of SSO ● Legacy SSO ● Password synchronization ● Software Token Based Authentication
  • 8. Legacy SSO ● aka - Enterprise or Employee SSO (eSSO) ● After primary authentication, it intercepts further login prompts and fills them for you ● Which is accomplished using – Script ● Which executes the real application with credentials – Background service ● Monitors for login prompts and pass credentials ● Products/Implementations – Citrix Password Manager, Imprivata eSSO appliance, PassLogix, Novell’s Secure Login
  • 9. Password Synchronization ● A process that coordinates passwords across multiple computers and devices and/or applications ● Each computer, device, application still authenticates but behind the scene ● Products/Implementations – MTech's P-Synch, Proginet's SecurPass, Systor's SAM Password Synchronization
  • 10. Software Token Based Authentication ● Allow users to enter their username and password in order to obtain a token ● Once their token has been obtained, the user can offer the token - which offers access to a specific resource for a time period - to the remote site instead of credentials ● Complex encryption with complex logic differentiates the implementations ● Usually associated with a session – Web SSO - Browser session – Other SSO - PC Log in session
  • 11. Web SSO ● Works for browser based applications ● Cookie support is required – Because token is kept in a cookie ● Usually single sign-on to applications deployed on a single web server (domain) ● Implementations – Jasig CAS
  • 12. PC Login session based SSO ● Works for all kinds of applications – Mail clients – Web applications ● Token is kept in user session ● Client application should implement this feature ● Implementations – Some Kerberos implementations – NTLM
  • 13. Mobile SSO ● Since Mobile Phone/Tab is a strictly personal device, SSO has not very significant role ● Can save all different passwords like in Legacy SSO ● As technology is getting complicated, SSO will be introduced in near future
  • 14. Q & A
  • 16. Thank you and Good luck :-)