Single Sign-On https://store.theartofservice.com/the-single-sign-on-toolkit.html.

Slides:



Advertisements
Similar presentations
Secure Single Sign-On Across Security Domains
Advertisements

Single Sign-On with GRID Certificates Ernest Artiaga (CERN – IT) GridPP 7 th Collaboration Meeting July 2003 July 2003.
ControlSphere is a computer security and automation solution designed to protect user data and automate most of authentication tasks for the user at work.
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
 Physical Logical Access  Physical and Logical Access  Total SSO and Password Automation  Disk/Data Encryption  Centralized management system  Biometric.
A Public Web Services Security Framework Based on Current and Future Usage Scenarios J.Thelin, Chief Architect PJ.Murray, Product Manager Cape Clear Software.
SINGLE SIGN-ON. Definition - SSO Single sign-on (SSO) is a session/user authentication process that permits a user to enter one name and password in order.
Lecture 23 Internet Authentication Applications
Grid Security. Typical Grid Scenario Users Resources.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Beispielbild Shibboleth, a potential security framework for EDIT Lutz Suhrbier AG Netzbasierte Informationssysteme (
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
Web Services Security Multimedia Information Engineering Lab. Yoon-Sik Yoo.
Using Internet Information Server And Microsoft ® Internet Explorer To Implement Security On The Intranet HTTP.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Alcatel Identity Server Alcatel SEL AG. Alcatel Identity Server — 2 All rights reserved © 2004, Alcatel What is an Identity Provider?  
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Single-Sign On and Federated Identity.
Authentication via campus single sign-on 2012 VIVO Implementation Fest.
Enterprise Single Sign On Identity management for web applications.
Server 2008 Terminal Services and Remote Desktop Services Basic application access is possible without Citrix, and Server 2008 R2 adds on some key features.
Public Key Infrastructure from the Most Trusted Name in e-Security.
Single Sign-On -Mayuresh Pardeshi M.Tech CSE - I.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Session 11: Security with ASP.NET
Timothy Heeney| Microsoft Corporation. Discuss the purpose of Identity Federation Explain how to implement Identity Federation Explain how Identity Federation.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Jeff Shiley. Start Point System Environment User Experience Our “Unique” Requirements Solution System Evaluation & Prototype Single Sign-on Component.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 Securing a Microsoft ASP.NET Web Application.
1 Using EMV cards for Single Sign-On 26 th June st European PKI Workshop Andreas Pashalidis and Chris J. Mitchell.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
ArcGIS Server and Portal for ArcGIS An Introduction to Security
Identity on Force.com & Benefits of SSO Nick Simha.
Unit 1: Protection and Security for Grid Computing Part 2
Module 5 Configuring Authentication. Module Overview Lesson 1: Understanding Classic SharePoint Authentication Providers Lesson 2: Understanding Federated.
Module 9: Fundamentals of Securing Network Communication.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
Openid Connect
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Shibboleth: An Introduction
Single Sign-On across Web Services Ernest Artiaga CERN - OpenLab Security Workshop – April 2004.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 7 Authentication Methods and Requirements.
WEB SERVER SOFTWARE FEATURE SETS
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Designing a Secure Extranet with Sharepoint Russ Basiura Principal Consultant RJB Technical Consulting
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Agenda  Microsoft Directory Synchronization Tool  Active Directory Federation Server  ADFS Proxy  Hybrid Features – LAB.
F5 APM & Security Assertion Markup Language ‘sam-el’
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
SAP NetWeaver Business Intelligence SAP Netweaver Business Warehouse (SAP NetWeaver BW) the name of the Business Intelligence,
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
ADFS - Does it Still have a Place? Fitting into the EMS puzzle Frank C. Drewes III 2016 Redmond Summit | Identity.
A National e-Authentication Service
Secure Single Sign-On Across Security Domains
Data and Applications Security Developments and Directions
Module 8: Securing Network Traffic by Using IPSec and Certificates
Forefront Security ISA
Goals Introduce the Windows Server 2003 family of operating systems
Public Key Infrastructure from the Most Trusted Name in e-Security
Office 365 Identity Management
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
Module 8: Securing Network Traffic by Using IPSec and Certificates
Presentation transcript:

Single Sign-On

Single sign-on 1 Single sign-on (SSO) is a property of access control of multiple related, but independent software systems. With this property a user logs in once and gains access to all systems without being prompted to log in again at each of them. Conversely, single sign-off is the property whereby a single action of signing out terminates access to multiple software systems.

Single sign-on 1 As different applications and resources support different authentication mechanisms, single sign-on has to internally translate to and store different credentials compared to what is used for initial authentication.

Single sign-on - Criticisms 1 The term enterprise reduced sign-on is preferred by some authors who believe single sign-on to be impossible in real use cases.

Single sign-on - Criticisms 1 As single sign-on provides access to many resources once the user is initially authenticated ("keys to the castle") it increases the negative impact in case the credentials are available to other persons and misused. Therefore, single sign-on requires an increased focus on the protection of the user credentials, and should ideally be combined with strong authentication methods like smart cards and one-time password tokens.

Single sign-on - Criticisms 1 Single sign-on also makes the authentication systems highly critical; a loss of their availability can result in denial of access to all systems unified under the SSO. SSO can thus be undesirable for systems to which access must be guaranteed at all times, such as security or plant-floor systems.

Single sign-on - Smart card based 1 Initial sign-on prompts the user for the smart card. Additional software applications also use the smart card, without prompting the user to re-enter credentials. Smart card-based single sign- on can either use certificates or passwords stored on the smart card.

Single sign-on - Security Assertion Markup Language 1 The user is called the subject in the SAML-based single sign-on

Single sign-on - Shared authentication schemes which are not single sign-on 1 Single sign-on requires that users literally sign in once to establish their credentials. Systems which require the user to log in multiple times to the same identity are inherently not single sign-on. For example, an environment where users are prompted to log into their desktop, then log into their using the same credentials, is not single sign-on.

Security token - Single sign-on software tokens 1 Some types of Single sign-on (SSO) solutions, like enterprise single sign-on, use the token to store software that allows for seamless authentication and password filling. As the passwords are stored on the token, users need not remember their passwords and therefore can select more secure passwords, or have more secure passwords assigned.

SAPgui - Single sign-on 1 SAPGUI on Microsoft Windows or Internet Explorer can also be used for single sign-on. There are several portal-based authentication applications for single sign-on. SAPGUI can have single sign-on with SAP Logon Ticket as well. Single sign-on also works in the Java GUI.[ s_in_the_SAP_GUI_for_Java.html Single Sign-on for SAP Java GUI]

SAP NetWeaver Process Integration - Single Sign-On 1 SAP NetWeaver PI allows for Single Sign-On through SAP Logon Tickets[ /en/32/1c1041a0f6f16fe a1550b0/fr ameset.htm Single Sign-On Configuration - Procedure for PI Web Components] and x.509 certificates. Certificates allow for the usage of Secure Network Communications (SNC) and Secure Socket Layer (SSL).

SAP Logon Ticket - Single Sign-On 1 SAP Logon Tickets can be used for single sign-on through the SAP Enterprise Portal. SAP provides a Web Server Filter that can be used for an authentication via http header variable and a Dynamic Link Library for verifying SSO Tickets in 3rd party software which can be used to provide native support for SAP Logon Tickets in applications written in C or Java.

SAP Logon Ticket - Single Sign-On to Microsoft Web Applications 1 This new ISAPI Filter requests a constrained Kerberos ticket for users identified by valid SAP Logon Ticket that can be used for SSO to Microsoft web based applications in the back end.[ troot/docs/library/uuid/47d0cd c86- f81b1c812e50?QuickLink=indexoverridela yout=true Using SAP Logon Tickets for Single Sign-On]

SAP XI - Single Sign-On 1 SAP NetWeaver PI allows for Single Sign- On through SAP Logon Tickets[ ata/en/32/1c1041a0f6f16fe a155 0b0/frameset.htm Single Sign-On Configuration - Procedure for PI Web Components] and x.509 certificates. Certificates allow for the usage of Secure Network Communications (SNC) and Secure Socket Layer (SSL).

Public key infrastructure - Temporary certificates and single sign-on 1 This approach involves a server that acts as an online certificate authority within a single sign-on system. A single sign-on server will issue digital certificates into the client system, but never stores them. Users can execute programs, etc. with the temporary certificate. It is common to find this solution variety with X.509-based certificates.Single Sign-On Technology for SAP Enterprises: What does SAP have to say? [

Univention Corporate Server - Single sign-on 1 With help of the identity provider, a single sign-on functionality for third party web services and applications (e.g., Google Apps, Salesforce.com etc.) can be realized while the authentication is done at the identity provider itself

For More Information, Visit: m/the-single-sign-on- toolkit.html m/the-single-sign-on- toolkit.html The Art of Service