wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

How Does SSO Works

profile
Mukesh Swamy
Oct 13, 2023
2 Likes
0 Discussions
193 Reads

Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for example, a username and password -- to access multiple applications. SSO can be used by enterprises, small and midsize organizations, and individuals to ease the management of multiple credentials.

How does single sign-on work?

Single sign-on is a federated identity management arrangement. The use of such a system is sometimes called identity federation. Open Authorization (OAuth) is the framework that enables an end user's account information to be used by third-party services, such as Facebook, without exposing the user's password.

OAuth acts as an intermediary on behalf of the end user by providing the service with an access token that authorizes specific account information to be shared. When a user attempts to access an application from the service provider, the service provider sends a request to the identity provider for authentication. The service provider then verifies the authentication and logs the user in.

In a basic web SSO service, an agent module on the application server retrieves the specific authentication credentials for an individual user from a dedicated SSO policy server, while authenticating the user against a user repository, such as a Lightweight Directory Access Protocol directory. The service authenticates the end user for all the applications the user has been given rights to and eliminates future password prompts for individual applications during the same session.

Types of SSO configurations

Some SSO services use protocols, such as Kerberos or Security Assertion Markup Language (SAML):

  • In a Kerberos-based setup, once user credentials are provided, a ticket-granting ticket (TGT) is issued. The TGT fetches service tickets for other applications the user wants to access, without asking the user to reenter credentials.
  • SAML is an Extensible Markup Language standard that facilitates the exchange of user authentication and authorizationdata across secure domains. SAML-based SSO services involve communications among the user, an identity provider that maintains a user directory and a service provider.
  • Smart card-based SSO asks an end user to use a card holding the sign-in credentials for the first login. Once the card is used, the user does not have to reenter usernames or passwords. SSO smart cards store either certificates or passwords.

Comments ()


Sign in

Read Next

CYBERPEACEKEEPING: NEW WAYS TO PREVENT AND MANAGE CYBERATTACKS

Blog banner

Maharashtrian culture: Tradition, Art, Food

Blog banner

KAHAWA TEA

Blog banner

Apache Spark :- Powerful Data Processing Tool

Blog banner

Why is ITSM important in IT organization?

Blog banner

Love is in air.....

Blog banner

Fashion design

Blog banner

Have You Explored India Yet?

Blog banner

Starvation

Blog banner

The Real Reason Patola Outfits Come at a Premium Cost

Blog banner

POVERTY:Causes and solutions to problems

Blog banner

Linux Threads:

Blog banner

Jamming Attacks in Network Security: Disrupting Communication Signals

Blog banner

Worms, viruses and Bots

Blog banner

Dos (Denial of service) Attack

Blog banner

Ethical Hacking

Blog banner

Service stratergy principles

Blog banner

Benefits of yoga and meditation

Blog banner

Characteristics of Etherum

Blog banner

Mental Health

Blog banner

Advantage of freedom

Blog banner

Office Lunch Problems in Mumbai and How Tiffin Services Solve Them

Blog banner

Full Disk Encryption on Digital Forensics

Blog banner

Service Operations in ITSM

Blog banner

5 ways to save money on catering services in Mumbai

Blog banner

Understanding the 'Ambiverts'

Blog banner

Chicken Dum Biryani

Blog banner

SMARTSHEET MANAGEMENT SYSTEM

Blog banner

Cache Memory(142)

Blog banner

Components of GIS

Blog banner

TOGETHER WE CAN CONQUER #team

Blog banner

Virtual Machine

Blog banner

Software Piracy & Online Data Protection in Digital World

Blog banner

Simple AI Symptom Diagnosis Using LISP – Rule-Based Expert System

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Practical Implementation of Client Server model using TCP/IP.

Blog banner

Life of a 2020-2021 student

Blog banner

Uniprocessor scheduling

Blog banner

21ST CENTURY PATRIARCHY

Blog banner

How Schools Can Reduce Exam Stress in Students?

Blog banner

Krishna Rao SAP ID--53003230076

Blog banner

virtual machine

Blog banner