wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

How Does SSO Works

profile
Mukesh Swamy
Oct 13, 2023
2 Likes
0 Discussions
193 Reads

Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for example, a username and password -- to access multiple applications. SSO can be used by enterprises, small and midsize organizations, and individuals to ease the management of multiple credentials.

How does single sign-on work?

Single sign-on is a federated identity management arrangement. The use of such a system is sometimes called identity federation. Open Authorization (OAuth) is the framework that enables an end user's account information to be used by third-party services, such as Facebook, without exposing the user's password.

OAuth acts as an intermediary on behalf of the end user by providing the service with an access token that authorizes specific account information to be shared. When a user attempts to access an application from the service provider, the service provider sends a request to the identity provider for authentication. The service provider then verifies the authentication and logs the user in.

In a basic web SSO service, an agent module on the application server retrieves the specific authentication credentials for an individual user from a dedicated SSO policy server, while authenticating the user against a user repository, such as a Lightweight Directory Access Protocol directory. The service authenticates the end user for all the applications the user has been given rights to and eliminates future password prompts for individual applications during the same session.

Types of SSO configurations

Some SSO services use protocols, such as Kerberos or Security Assertion Markup Language (SAML):

  • In a Kerberos-based setup, once user credentials are provided, a ticket-granting ticket (TGT) is issued. The TGT fetches service tickets for other applications the user wants to access, without asking the user to reenter credentials.
  • SAML is an Extensible Markup Language standard that facilitates the exchange of user authentication and authorizationdata across secure domains. SAML-based SSO services involve communications among the user, an identity provider that maintains a user directory and a service provider.
  • Smart card-based SSO asks an end user to use a card holding the sign-in credentials for the first login. Once the card is used, the user does not have to reenter usernames or passwords. SSO smart cards store either certificates or passwords.

Comments ()


Sign in

Read Next

38_Network Sniffing Techniques_SBC

Blog banner

Different types of scam Fraud

Blog banner

Modern Operating System - Khush Bagaria

Blog banner

QUANTUM COMPUTING IN SECURITY:A GAME CHANGER IN DIGITAL WORLD

Blog banner

VIRTUAL MACHINE

Blog banner

BharatPe

Blog banner

File Sharing

Blog banner

Stop Racism

Blog banner

Why Meal Maharaj Prioritises Seasonal Vegetables in Every Meal Box

Blog banner

Predictive Analytics: How Data Science Predicts Trends(Weather ,Stock Market,Sales Forecasting ).

Blog banner

Financial Fraud Detection

Blog banner

Number Guessing game --lisp

Blog banner

Session Hijacking Techniques

Blog banner

Deadlock and Starvation

Blog banner

Virtual memory

Blog banner

Security issues

Blog banner

Digital Balance: Keeping Children Mindful in the Screen Age

Blog banner

Image Steganalysis in Digital Forensics

Blog banner

Service Catalogue Management

Blog banner

Firewall in Computer Network

Blog banner

Data Science in Predictive Analytics: Transforming Business Decision-Making

Blog banner

Depression

Blog banner

A Heartfelt Act of Kindness

Blog banner

HTML vs HTML5

Blog banner

Place to visit in pune

Blog banner

Objectives and functions of Operating System...

Blog banner

The Secure Software Development Life Cycle (SDLC)

Blog banner

Virtual machine and virtualizing

Blog banner

Mail merge

Blog banner

Virtual memory

Blog banner

The Dark Web: A Breeding Ground for Cybercriminals – How to Guard Against Threats

Blog banner

Cyber Bullying - Neeta Vonkamuti

Blog banner

Understanding - Proof of Work!

Blog banner

Virtual memory

Blog banner

How to setup a professional looking business account on Instagram?

Blog banner

Pink sauce pasta

Blog banner

You'll get to know about Pankaj Negi

Blog banner

BrainGate Technology

Blog banner

Diwali

Blog banner

Memory Management

Blog banner

MySQL

Blog banner

Lemon and Chilli Pickle (Limbu Mirchi Achar)

Blog banner