![]() ![]() Target applications do not need to be modified to work with the eSSO system. These credentials are almost always a username and password. Enterprise SSOĮnterprise single sign-on (eSSO) software and services are password managers with client and server components that log a user on to target applications by replaying user credentials. Many security professionals recommend end users refrain from using social SSO services because, once attackers gain control of a user's SSO credentials, they can access all other applications that use the same credentials. Although social single sign-on is a convenience to users, it can present security risks because it creates a single point of failure that can be exploited by attackers. Google, LinkedIn, Apple, Twitter and Facebook offer popular SSO services that enable end users to log in to third-party applications with their social media authentication credentials. Organizations can also use two-factor authentication ( 2FA) or multifactor authentication with SSO to improve security. In order to avoid malicious access, SSO should be coupled with identity governance. An attacker who gains control over a user's SSO credentials is granted access to every application the user has rights to, increasing the amount of potential damage. ![]() SSO smart cards store either certificates or passwords.Īlthough single sign-on is a convenience to users, it presents risks to enterprise security. Once the card is used, the user does not have to reenter usernames or passwords. Smart card-based SSO asks an end user to use a card holding the sign-in credentials for the first login.SAML-based SSO services involve communications among the user, an identity provider that maintains a user directory and a service provider. SAML is an Extensible Markup Language standard that facilitates the exchange of user authentication and authorizationdata across secure domains.The TGT fetches service tickets for other applications the user wants to access, without asking the user to reenter credentials. In a Kerberos-based setup, once user credentials are provided, a ticket-granting ticket (TGT) is issued.Some SSO services use protocols, such as Kerberos or Security Assertion Markup Language ( SAML): The service authenticates the end user for all the applications the user has been given rights to and eliminates future password prompts for individual applications during the same session. In a basic web SSO service, an agent module on the application server retrieves the specific authentication credentials for an individual user from a dedicated SSO policy server, while authenticating the user against a user repository, such as a Lightweight Directory Access Protocol directory. The service provider then verifies the authentication and logs the user in. When a user attempts to access an application from the service provider, the service provider sends a request to the identity provider for authentication. OAuth acts as an intermediary on behalf of the end user by providing the service with an access token that authorizes specific account information to be shared. Open Authorization ( OAuth) is the framework that enables an end user's account information to be used by third-party services, such as Facebook, without exposing the user's password. The use of such a system is sometimes called identity federation. Single sign-on is a federated identity management arrangement. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |