wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

How Does SSO Works

profile
Mukesh Swamy
Oct 13, 2023
2 Likes
0 Discussions
192 Reads

Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for example, a username and password -- to access multiple applications. SSO can be used by enterprises, small and midsize organizations, and individuals to ease the management of multiple credentials.

How does single sign-on work?

Single sign-on is a federated identity management arrangement. The use of such a system is sometimes called identity federation. Open Authorization (OAuth) is the framework that enables an end user's account information to be used by third-party services, such as Facebook, without exposing the user's password.

OAuth acts as an intermediary on behalf of the end user by providing the service with an access token that authorizes specific account information to be shared. When a user attempts to access an application from the service provider, the service provider sends a request to the identity provider for authentication. The service provider then verifies the authentication and logs the user in.

In a basic web SSO service, an agent module on the application server retrieves the specific authentication credentials for an individual user from a dedicated SSO policy server, while authenticating the user against a user repository, such as a Lightweight Directory Access Protocol directory. The service authenticates the end user for all the applications the user has been given rights to and eliminates future password prompts for individual applications during the same session.

Types of SSO configurations

Some SSO services use protocols, such as Kerberos or Security Assertion Markup Language (SAML):

  • In a Kerberos-based setup, once user credentials are provided, a ticket-granting ticket (TGT) is issued. The TGT fetches service tickets for other applications the user wants to access, without asking the user to reenter credentials.
  • SAML is an Extensible Markup Language standard that facilitates the exchange of user authentication and authorizationdata across secure domains. SAML-based SSO services involve communications among the user, an identity provider that maintains a user directory and a service provider.
  • Smart card-based SSO asks an end user to use a card holding the sign-in credentials for the first login. Once the card is used, the user does not have to reenter usernames or passwords. SSO smart cards store either certificates or passwords.

Comments ()


Sign in

Read Next

Os Virtual Memory

Blog banner

Hacking of web server and application

Blog banner

Virtual memory

Blog banner

What is Brute Force Attack? How to defend against it?

Blog banner

Memory input output management

Blog banner

Article on IT development trends

Blog banner

Components of GIS

Blog banner

CONCURRENCY

Blog banner

Exploring the Power of Encase Forensic Tools: Unraveling Digital Mysteries

Blog banner

The Truth Behind Viral DIY Dental Hacks

Blog banner

Emailing the merger document

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner

Blog on Smartsheet.

Blog banner

Incorporating Automation into Digital Forensics.

Blog banner

Network Footprinting in Cybersecurity

Blog banner

CyberSecurity Color Wheel

Blog banner

VPN

Blog banner

Importance of business process documentation

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

Lemon and Chilli Pickle (Limbu Mirchi Achar)

Blog banner

The art of being alone

Blog banner

Water Resources are about to exhaust...

Blog banner

Embaded operating system

Blog banner

Record Blocking

Blog banner

RAID - LEVELS OF RAID

Blog banner

ZOHO

Blog banner

Linux

Blog banner

Starting Android Activity Using Intent

Blog banner

ADD A SPICE TO YOUR LIFE.

Blog banner

Importance of Education

Blog banner

RAID

Blog banner

Os assignment

Blog banner

Brain wash of social media

Blog banner

Supervised and Unsupervised Learning

Blog banner

Game Theory in Blockchain

Blog banner

Cyber Security in Data Breaching

Blog banner

How to feel Happy everyday day

Blog banner

Threads

Blog banner

Virtual memory

Blog banner

What is Spyware?

Blog banner

Microsoft Windows Overview

Blog banner

Memory management

Blog banner