wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

How Does SSO Works

profile
Mukesh Swamy
Oct 13, 2023
2 Likes
0 Discussions
193 Reads

Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for example, a username and password -- to access multiple applications. SSO can be used by enterprises, small and midsize organizations, and individuals to ease the management of multiple credentials.

How does single sign-on work?

Single sign-on is a federated identity management arrangement. The use of such a system is sometimes called identity federation. Open Authorization (OAuth) is the framework that enables an end user's account information to be used by third-party services, such as Facebook, without exposing the user's password.

OAuth acts as an intermediary on behalf of the end user by providing the service with an access token that authorizes specific account information to be shared. When a user attempts to access an application from the service provider, the service provider sends a request to the identity provider for authentication. The service provider then verifies the authentication and logs the user in.

In a basic web SSO service, an agent module on the application server retrieves the specific authentication credentials for an individual user from a dedicated SSO policy server, while authenticating the user against a user repository, such as a Lightweight Directory Access Protocol directory. The service authenticates the end user for all the applications the user has been given rights to and eliminates future password prompts for individual applications during the same session.

Types of SSO configurations

Some SSO services use protocols, such as Kerberos or Security Assertion Markup Language (SAML):

  • In a Kerberos-based setup, once user credentials are provided, a ticket-granting ticket (TGT) is issued. The TGT fetches service tickets for other applications the user wants to access, without asking the user to reenter credentials.
  • SAML is an Extensible Markup Language standard that facilitates the exchange of user authentication and authorizationdata across secure domains. SAML-based SSO services involve communications among the user, an identity provider that maintains a user directory and a service provider.
  • Smart card-based SSO asks an end user to use a card holding the sign-in credentials for the first login. Once the card is used, the user does not have to reenter usernames or passwords. SSO smart cards store either certificates or passwords.

Comments ()


Sign in

Read Next

EMAIL INVESTIGATION

Blog banner

Facebook marketing

Blog banner

Security issues in Sensor Networks and gathering admissible evidence in Network Forensics

Blog banner

Is Your Password Complex Enough?

Blog banner

Mesh Topology

Blog banner

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

Blog banner

Health and fitness in technology

Blog banner

Precision-Recall in Data Science

Blog banner

Process in OS

Blog banner

Cyber Forensics in a Ransomware Attack Recovery

Blog banner

Predictive Analytics: How Data Science Predicts Trends(Weather ,Stock Market,Sales Forecasting ).

Blog banner

A True Friendship

Blog banner

Zero-Day Attack

Blog banner

Virtual memory

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner

Be you

Blog banner

ODOO

Blog banner

MEMORY MANAGEMENT REQUIREMENT

Blog banner

Security in Operating Systems

Blog banner

MOVEMBER

Blog banner

Memory heirchy

Blog banner

USES OF WHATSAPP

Blog banner

Threat management

Blog banner

Google classroom

Blog banner

VPN

Blog banner

Health and fitness

Blog banner

Blockchain uses and use cases

Blog banner

OS ASSIGNMENT

Blog banner

How to Find the Right Therapist For Me?

Blog banner

Deadlock

Blog banner

Importance of self defence for girls

Blog banner

Deadlock and Starvation

Blog banner

'Positivity in life'

Blog banner

From Loom to Luxury: How Patola Elevates Modern Wardrobes

Blog banner

INTERNET SECURITY

Blog banner

Gamer life

Blog banner

ARTICAL ON MANAGEMENT SYSTEM

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

IS CONVERTING AMBITION INTO PROFESSION?

Blog banner

How User Data Shapes Personalised Campaigns

Blog banner

Whatsapp Messenger

Blog banner

LINUX

Blog banner