wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

How Does SSO Works

profile
Mukesh Swamy
Oct 13, 2023
2 Likes
0 Discussions
193 Reads

Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for example, a username and password -- to access multiple applications. SSO can be used by enterprises, small and midsize organizations, and individuals to ease the management of multiple credentials.

How does single sign-on work?

Single sign-on is a federated identity management arrangement. The use of such a system is sometimes called identity federation. Open Authorization (OAuth) is the framework that enables an end user's account information to be used by third-party services, such as Facebook, without exposing the user's password.

OAuth acts as an intermediary on behalf of the end user by providing the service with an access token that authorizes specific account information to be shared. When a user attempts to access an application from the service provider, the service provider sends a request to the identity provider for authentication. The service provider then verifies the authentication and logs the user in.

In a basic web SSO service, an agent module on the application server retrieves the specific authentication credentials for an individual user from a dedicated SSO policy server, while authenticating the user against a user repository, such as a Lightweight Directory Access Protocol directory. The service authenticates the end user for all the applications the user has been given rights to and eliminates future password prompts for individual applications during the same session.

Types of SSO configurations

Some SSO services use protocols, such as Kerberos or Security Assertion Markup Language (SAML):

  • In a Kerberos-based setup, once user credentials are provided, a ticket-granting ticket (TGT) is issued. The TGT fetches service tickets for other applications the user wants to access, without asking the user to reenter credentials.
  • SAML is an Extensible Markup Language standard that facilitates the exchange of user authentication and authorizationdata across secure domains. SAML-based SSO services involve communications among the user, an identity provider that maintains a user directory and a service provider.
  • Smart card-based SSO asks an end user to use a card holding the sign-in credentials for the first login. Once the card is used, the user does not have to reenter usernames or passwords. SSO smart cards store either certificates or passwords.

Comments ()


Sign in

Read Next

How to feel Happy everyday day

Blog banner

Electronic Evidence in Cyber Forensics

Blog banner

Perfect Moments to Wear a Rich Patola Design Outfit

Blog banner

Importance of Network Security Risk

Blog banner

Memory management

Blog banner

The New Dr. Frankenstein who will perform first full head transplant

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

Simple Ways of Avoiding Basic Mistakes in Smart Phone Security

Blog banner

RACI model in IT services

Blog banner

Concurrency and Deadlocks

Blog banner

Memory hierarchy

Blog banner

Paralysis/Paralysis Stroke

Blog banner

How to use open SSL for web server - browser communication

Blog banner

Sage business cloud accounting

Blog banner

10 Reasons to date your best friend

Blog banner

From Procrastinator to Performer: How to Beat the Last-Minute Rush

Blog banner

OS PROCESS DESCRIPTION AND CONTROL-SARVAGYA JALAN

Blog banner

What is Virtual Memory

Blog banner

Cyber Security in Data Breaching

Blog banner

Data Analytics in Data Science

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

What Function Does SEO Serve in Digital Marketing?

Blog banner

Understanding the 4 Types of Learning Methods in Early Childhood

Blog banner

Predictive Analytics: How Data Science Predicts Trends(Weather ,Stock Market,Sales Forecasting ).

Blog banner

Session Vulnerabilities

Blog banner

Virtual machine

Blog banner

Every body is beautiful

Blog banner

Evolution of operating system

Blog banner

Meshoo

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

Starvation

Blog banner

Mumbai

Blog banner

LINUX

Blog banner

Privacy in Social Media and Online Services

Blog banner

Virtual Memory

Blog banner

VPN

Blog banner

PPT methodology

Blog banner

Hubspot

Blog banner

SmartData Collective: Data Science aur Analytics ki Duniya

Blog banner

INTERRUPTS

Blog banner

Explaining Buffer Overflow with Example

Blog banner

Internet: The Vast Ocean Of Knowledge.

Blog banner