wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

How Does SSO Works

profile
Mukesh Swamy
Oct 13, 2023
2 Likes
0 Discussions
193 Reads

Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for example, a username and password -- to access multiple applications. SSO can be used by enterprises, small and midsize organizations, and individuals to ease the management of multiple credentials.

How does single sign-on work?

Single sign-on is a federated identity management arrangement. The use of such a system is sometimes called identity federation. Open Authorization (OAuth) is the framework that enables an end user's account information to be used by third-party services, such as Facebook, without exposing the user's password.

OAuth acts as an intermediary on behalf of the end user by providing the service with an access token that authorizes specific account information to be shared. When a user attempts to access an application from the service provider, the service provider sends a request to the identity provider for authentication. The service provider then verifies the authentication and logs the user in.

In a basic web SSO service, an agent module on the application server retrieves the specific authentication credentials for an individual user from a dedicated SSO policy server, while authenticating the user against a user repository, such as a Lightweight Directory Access Protocol directory. The service authenticates the end user for all the applications the user has been given rights to and eliminates future password prompts for individual applications during the same session.

Types of SSO configurations

Some SSO services use protocols, such as Kerberos or Security Assertion Markup Language (SAML):

  • In a Kerberos-based setup, once user credentials are provided, a ticket-granting ticket (TGT) is issued. The TGT fetches service tickets for other applications the user wants to access, without asking the user to reenter credentials.
  • SAML is an Extensible Markup Language standard that facilitates the exchange of user authentication and authorizationdata across secure domains. SAML-based SSO services involve communications among the user, an identity provider that maintains a user directory and a service provider.
  • Smart card-based SSO asks an end user to use a card holding the sign-in credentials for the first login. Once the card is used, the user does not have to reenter usernames or passwords. SSO smart cards store either certificates or passwords.

Comments ()


Sign in

Read Next

BLOCKCHAIN MACHANISM

Blog banner

Tomato Butter Sauce with Bucatini

Blog banner

What is thread and multithreading ?

Blog banner

NETWORK SECURITY RISKS

Blog banner

What is E-commerce

Blog banner

Stories Woven in Silk: The Meaning Behind Patola Motifs

Blog banner

To travel is to live

Blog banner

1.1 basic elements

Blog banner

I/O Buffering

Blog banner

Facebook Shut Down an AI Program!!! Facebook AI bots became Terminators???

Blog banner

Landslide Hazard

Blog banner

SQL Injection Techniques

Blog banner

Service stratergy principles

Blog banner

This too shall pass

Blog banner

File management

Blog banner

A Happier Workplace Starts with Healthy Lunches by Meal Maharaj

Blog banner

security controls

Blog banner

I/O Management and Disk Scheduling

Blog banner

Should you be using a mouthwash? Know from the experts

Blog banner

Sage

Blog banner

File sharing

Blog banner

JUSTICE FOR EVERY “BEZUBAAN ANIMAL”

Blog banner

PPC Advertising and its Impressive Benefits

Blog banner

The Role of Summer Camps in Early Childhood Development

Blog banner

How Laughing Gas Makes Your Dental Visit So Much Easier

Blog banner

Process in OS

Blog banner

geographic information system (GIS)

Blog banner

Security issues in Sensor Networks and gathering admissible evidence in Network Forensics

Blog banner

E-learning in today's world

Blog banner

AI and Cyber Security

Blog banner

Uniprocessor scheduling

Blog banner

Types of Malware in Cyber Security

Blog banner

Capacity management in ITSM

Blog banner

“CONSISTENCY” in Social Media Marketing

Blog banner

How to feel Happy everyday day

Blog banner

Digital Balance: Keeping Children Mindful in the Screen Age

Blog banner

What is Internet

Blog banner

Revolutionary AI Tool: ChatGPT

Blog banner

MAHAKAL LOK UJJAIN

Blog banner

Importance Of Education.

Blog banner

Everything You Need for a Perfect Stay in Arcadia, Florida, USA.

Blog banner

IP Address

Blog banner