SINGLE SIGN-ON. Definition - SSO Single sign-on (SSO) is a session/user authentication process that permits a user to enter one name and password in order.

Slides:



Advertisements
Similar presentations
© 2006 IBM Corporation Tivoli Identity Manager Express Tivoli Access Manager for Enterprise Single Sign-On (Product Demonstrations) Tivoli Live! – 15 June.
Advertisements

Secure Single Sign-On Across Security Domains
Identity Theft and Online Identity Solutions Heidi Inman May 29, 2008.
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Authentication solutions for Outlook and Office 365 Multi-factor authentication for Office 365 Outlook client futures.
Building the Future: Millennium’s Relationship with Campus Systems and Services John Culshaw Faculty Director for Systems University of Colorado at Boulder.
Digital DNA Server Login People ®. Login People ˃ IT security vendor ˃ Patented Digital DNA ® technology innovation Digital DNA Server Multi-factor Authentication.
Access Control Methodologies
Grid Security. Typical Grid Scenario Users Resources.
Password?. Project CLASP: Common Login and Access rights across Services Plan
Password?. Project CLASP: Common Login and Access rights across Services Plan
Prepared by Dept. of Information Technology & Telecommunication, October 24, 2005 Enterprise Directory Services and Identity Management.
Active Directory: Final Solution to Enterprise System Integration
Identity and Access Management: Strategy and Solution Sandeep Sinha Lead Product Manager Windows Server Product Management Redmond,
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
CS795/895.NET Passport1. NET PASSPORT &TRUSTBRIDGE SHRIPAD PATIL CS795/895 SECURITY IN DISTRIBUTED SYSTEMS.
Identity and Access Management IAM. 2 Definition Identity and Access Management provide the following: – Mechanisms for identifying, creating, updating.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Alcatel Identity Server Alcatel SEL AG. Alcatel Identity Server — 2 All rights reserved © 2004, Alcatel What is an Identity Provider?  
Secure Element Access from a Web browser W3C Workshop on Authentication, Hardware Tokens and Beyond 11 September Oberthur Technologies – Identity.
Identity and Access Management
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Single-Sign On and Federated Identity.
Authentication via campus single sign-on 2012 VIVO Implementation Fest.
Enterprise Single Sign On Identity management for web applications.
Single Sign-on Integration (SSI) MSIT 458 – Information Security Project Part 2 Prepared for Professor Yan Chen Prepared by Team Triad Radu Bulgaru Moniza.
What’s New in WatchGuard SSL v3.1. WatchGuard Training 2 Ease-of-Use Security Scalability 1.Streamlined resource configuration 2.Centralized access rules.
Single Sign-On -Mayuresh Pardeshi M.Tech CSE - I.
PHASE 3: SYSTEMS DESIGN Chapter 8 System Architecture.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Oracle Application Server 10g (9.0.4) Recommended Topologies Pavana Jain.
Authenticating Users Chapter 6. Learning Objectives Understand why authentication is a critical aspect of network security Describe why firewalls authenticate.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
© Logicalis Group Single signon possibilities for iSeries Mandy Shaw, Logicalis (with many thanks to Pat Botz of IBM Rochester)
Sudha Iyer Principal Product Manager Oracle Corporation.
Single Sign-On
The Right OS for Your Job Major: Computer Science Instructor: Dr Anvari Presenter: Ke Huang Student ID:
Authority of Information Technology Application National Center of Digital Signature Authentication Ninh Binh, June 25, 2010.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
What Makes Users Refuse Web Single Sign-On? An Empirical Investigation of OpenID Daniel Smith.
FSU Metadirectory Project The Issue of Identity Management Executive Overview.
Qaforum Security Structure. What’s SSO Single sign-on (SSO) is mechanism whereby a single action of user authentication and authorization can permit a.
Information Technology Current Work in System Architecture January 2004 Tom Board Director, NUIT Information Systems Architecture.
TOPIC: AUTHENTICITY CREATED BY SWAPNIL SAHOO AuthenticityAuthorisation Access Control Basic Authentication Apache BASIC AUTHENTICATIONDIGEST ACCESS AUTHENTICATIONDHCP.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Strategic Agenda We want to be connected to the internet……… We may even want to host our own web site……… We must have a secure network! What are the.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Admission season in the universities and colleges can become really hectic and confusing. Students, administration and the entire management have to be.
ADFS - Does it Still have a Place? Fitting into the EMS puzzle Frank C. Drewes III 2016 Redmond Summit | Identity.
CLASSe PROJECT: IMPROVING SSO IN THE CLOUD Alejandro Pérez Rafael Marín Gabriel López
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
Understand User Authentication LESSON 2.1A Security Fundamentals.
11 | Managing User Info Jeremy Foster Michael Palermo
Secure Connected Infrastructure
New Developments in Central Directory Service and Account Provisioning Dan Menicucci Enterprise Architect - University of Pittsburgh.
Secure Single Sign-On Across Security Domains
Microsoft Passport and Windows Hello Developer’s Guide to Windows 10 Build SDK Update Andy Wigley
Single Sign-On Led by Terrice McClain, Jen Paulin, & Leighton Wingerd
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
WEB BASED SINGLE SIGN-ON
Cloud Connect Seamlessly
A single identity for the modern user
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
This is a typical Windows user desktop
CLIENT/SERVER COMPUTING ENVIRONMENT
Microsoft Virtual Academy
Presentation transcript:

SINGLE SIGN-ON

Definition - SSO Single sign-on (SSO) is a session/user authentication process that permits a user to enter one name and password in order to access multiple applications. The process authenticates the user for all the applications they have been given rights to and eliminates further prompts when they switch applications during a particular session.

Common Examples Common single sign-on configuration Kerberos based systems Smart card based system One-time password Integrated windows authentication

Social Aspect Following are social aspect of SSO Reduces phishing success, because users are not trained to enter password everywhere without thinking. Reducing password fatigue from different user name and password combinations Reducing time spent re-entering passwords for the same identity Reducing IT costs due to lower number of IT helpdesk calls about passwords and infrastructure cost Security on all levels of entry/exit/access to systems without the inconvenience of re-prompting users Centralized reporting for compliance adherence.

Potential Issues As single sign-on provides access to many resources once the user is initially authenticated, it increases the negative impact in case the credentials are available to other persons and misused. Therefore, single sign-on requires an secure authentication mechanism.

List of Products Following products are available for single sign-on implementation Microsoft Forefront Identity Manager IBM – Tivoli security access manager Kerberos – Computer network authentication protocol HP Ice Wall SSO – Web and Federated single sign-on Custom in-house built solution

Cost Analysis In-House Solution = $100,000 (no additional support cost) IBM = $590,000 plus annual support costs Microsoft = $231,000 plus annual support Based on 5,000 user estimate. Software only costs, no additional hardware figured into this estimate

Business Aspect Helps business to bring multiple system into one umbrella. It allows business to move multiple applications towards the portal strategy. Portal lets user to authentication once and then based on authorization system allows them to navigate to other applications.

Summary Decision to go with Single Sign-On Security, Safety, User convenience, and reduced IT load  Customized Proprietary Solution Cost, adaptability, flexibility This solution summary is geared towards a large company with 5,000+ users. A small 100 user shop would have different priorities and needs in the final choice. They might be more likely to go with an off-the-shelf solution for easier support with a smaller IT staff.

Questions?  Thank you!