SlideShare a Scribd company logo
8
Most read
9
Most read
10
Most read
Single Sign On – The Basics
Ishan A B Ambanwela
Contents
● What is SSO
● Not to be Confused with
● Pros & Cons
● SSO Approaches – By Configuration
● Types of SSO
– Legacy SSO
– Password Synchronization
– Software Token Based Authentication
● Browser Session
● PC Login session
– Mobile SSO
● Q&A
What is SSO
● Single sign-on gives users the ability to access
more than one protected resource (Web
pages and applications) with one
authentication.
Not to be Confused with...
● Authentication vs Authorization
● Shared authentication schemes
– Oauth
– OpenID / OpenID Connect
– Facebook Connect
● Single Sign Out
Pros & Cons
● Reduced operational cost
● Reduced time to access data
● Improved user experience
● Ease burden on developers
● Centralized management of
users
● Fine grained auditing
● Effective compliance
● Advanced security to systems
– Smart cards, One time password
tokens
● impractical in different levels
of secure access
● increases the negative impact
in case of credentials exposed
● makes the authentication
systems highly critical
● Complex logics and pitfalls
● Should combined with strong
authentication methods
– Smart cards, One time
password tokens
SSO Approaches – By Configuration
● Smart card based
● Kerberos based
● SAML (Security Assertion Markup Language)
● Integrated Windows Authentication
– An umbrella term for
● SPNEGO, Kerberos, and NTLMSSP
Types of SSO
● Legacy SSO
● Password synchronization
● Software Token Based Authentication
Legacy SSO
● aka - Enterprise or Employee SSO (eSSO)
● After primary authentication, it intercepts further login prompts
and fills them for you
● Which is accomplished using
– Script
● Which executes the real application with credentials
– Background service
● Monitors for login prompts and pass credentials
● Products/Implementations
– Citrix Password Manager, Imprivata eSSO appliance, PassLogix,
Novell’s Secure Login
Password Synchronization
● A process that coordinates passwords across
multiple computers and devices and/or
applications
● Each computer, device, application still
authenticates but behind the scene
● Products/Implementations
– MTech's P-Synch, Proginet's SecurPass, Systor's
SAM Password Synchronization
Software Token Based
Authentication
● Allow users to enter their username and password in order
to obtain a token
● Once their token has been obtained, the user can offer the
token - which offers access to a specific resource for a time
period - to the remote site instead of credentials
● Complex encryption with complex logic differentiates the
implementations
● Usually associated with a session
– Web SSO - Browser session
– Other SSO - PC Log in session
Web SSO
● Works for browser based applications
● Cookie support is required
– Because token is kept in a cookie
● Usually single sign-on to applications deployed
on a single web server (domain)
● Implementations
– Jasig CAS
PC Login session based SSO
● Works for all kinds of applications
– Mail clients
– Web applications
● Token is kept in user session
● Client application should implement this feature
● Implementations
– Some Kerberos implementations
– NTLM
Mobile SSO
● Since Mobile Phone/Tab is a strictly personal
device, SSO has not very significant role
● Can save all different passwords like in Legacy
SSO
● As technology is getting complicated, SSO will
be introduced in near future
Q & A
References
● https://www.owasp.org/images/2/26/OWASPSa
nAntonio_2006_08_SingleSignOn.ppt
● http://www.jasig.org/cas/protocol
● http://web.mit.edu/kerberos/
● Various SSO products pages
Thank you and Good luck :-)

More Related Content

PPTX
SINGLE SIGN-ON
PPTX
SSO introduction
PPTX
Single sign on - SSO
PPT
Presentation sso design_security
PDF
Single sign on (SSO) How does your company apply?
PPTX
What is SSO? An introduction to Single Sign On
PPTX
Single Sign On 101
PPT
SSO Strategy Implementation Considerations
SINGLE SIGN-ON
SSO introduction
Single sign on - SSO
Presentation sso design_security
Single sign on (SSO) How does your company apply?
What is SSO? An introduction to Single Sign On
Single Sign On 101
SSO Strategy Implementation Considerations

What's hot (20)

PDF
Enterprise Single Sign-On - SSO
PPTX
Identity and Access Management Introduction
PPT
OAuth 2.0 and OpenId Connect
PDF
Introduction to SAML 2.0
PPTX
Single Sign On Considerations
PPTX
Single sign on - benefits, challenges and case study : iFour consultancy
PDF
F5 ASM v12 DDoS best practices
PDF
SAML Protocol Overview
PDF
Introduction to OpenID Connect
PPTX
An Introduction to OAuth2
PDF
SAML VS OAuth 2.0 VS OpenID Connect
PPT
Application Security
PPTX
Draft: building secure applications with keycloak (oidc/jwt)
PDF
OpenID Connect Explained
PDF
Introduction to OAuth2.0
PPTX
Rest API Security - A quick understanding of Rest API Security
PDF
OAuth & OpenID Connect Deep Dive
PPTX
Identity Management with the ForgeRock Identity Platform - So What’s New?
PDF
Implementing OAuth
Enterprise Single Sign-On - SSO
Identity and Access Management Introduction
OAuth 2.0 and OpenId Connect
Introduction to SAML 2.0
Single Sign On Considerations
Single sign on - benefits, challenges and case study : iFour consultancy
F5 ASM v12 DDoS best practices
SAML Protocol Overview
Introduction to OpenID Connect
An Introduction to OAuth2
SAML VS OAuth 2.0 VS OpenID Connect
Application Security
Draft: building secure applications with keycloak (oidc/jwt)
OpenID Connect Explained
Introduction to OAuth2.0
Rest API Security - A quick understanding of Rest API Security
OAuth & OpenID Connect Deep Dive
Identity Management with the ForgeRock Identity Platform - So What’s New?
Implementing OAuth
Ad

Viewers also liked (19)

PPTX
Single sign on
PDF
Single Sign-On Best Practices
PDF
Pharmaceutical e-Marketing v2.0
PPT
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
PPTX
Setting up the To Do Module
ODP
Hadoop - Overview
PPTX
IT Strategy Development Process
DOCX
Home exam answers
PPT
Plants adaptations presentation for kids
PPTX
Top 10 tech support manager interview questions and answers
PPTX
Top 10 project officer interview questions and answers pdf
DOCX
Training Program Presentation
PDF
Retail Brand Development. Challenges and Opportunities - a Russian Perspective
PPTX
Electrical Pressure Measuring Devices
PPT
Transcription & Translation
PPTX
SOLID DISPERSION TECHNIQUE
PPTX
Thermistor Temperature Sensors
PPTX
Gas chromatography and its instrumentation
PPTX
Febrile neutropenia
Single sign on
Single Sign-On Best Practices
Pharmaceutical e-Marketing v2.0
Fast and Free SSO: A Survey of Open-Source Solutions to Single Sign-on
Setting up the To Do Module
Hadoop - Overview
IT Strategy Development Process
Home exam answers
Plants adaptations presentation for kids
Top 10 tech support manager interview questions and answers
Top 10 project officer interview questions and answers pdf
Training Program Presentation
Retail Brand Development. Challenges and Opportunities - a Russian Perspective
Electrical Pressure Measuring Devices
Transcription & Translation
SOLID DISPERSION TECHNIQUE
Thermistor Temperature Sensors
Gas chromatography and its instrumentation
Febrile neutropenia
Ad

Similar to Single Sign On - The Basics (20)

PDF
Why you should use true single-sign-on in Icinga Web 2 - Icinga Camp Stockhol...
PDF
Tdp ws trust
PPT
Single sign on and its significance .ppt
PPTX
SSO IN/With Drupal and Identitiy Management
PDF
OWASP Top 10 Proactive Control 2016 (C5-C10)
PDF
Implementation of Single Sign On (SSO) Technology Using SAML Standards At U...
PPT
Single sign on assistant an authentication brokers
PPTX
Anonymous Individual Integration for IoT
PPT
sso_on_new system with security is more concern
PPTX
IoT mobile app device cloud identity and security architecture
PDF
2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity
PDF
implement authentication mechanisms
PPTX
PAM System Introduction.pptx, technical proposal for Pam system
PDF
ForgeRock Platform Release - Summer 2016
PDF
Two-factor Authentication
PDF
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
PDF
Webinar: Talking to Devices - The Importance of a Comprehensive Internet of T...
PPTX
Choosing the Best Business Intelligence Security Model for Your App
PPTX
Securing ap is oauth and fine grained access control
PDF
Mobile Authentication - Moving Towards a Passwordless Future
Why you should use true single-sign-on in Icinga Web 2 - Icinga Camp Stockhol...
Tdp ws trust
Single sign on and its significance .ppt
SSO IN/With Drupal and Identitiy Management
OWASP Top 10 Proactive Control 2016 (C5-C10)
Implementation of Single Sign On (SSO) Technology Using SAML Standards At U...
Single sign on assistant an authentication brokers
Anonymous Individual Integration for IoT
sso_on_new system with security is more concern
IoT mobile app device cloud identity and security architecture
2022 APIsecure_Passwordless Multi-factor Authentication Security and Identity
implement authentication mechanisms
PAM System Introduction.pptx, technical proposal for Pam system
ForgeRock Platform Release - Summer 2016
Two-factor Authentication
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
Webinar: Talking to Devices - The Importance of a Comprehensive Internet of T...
Choosing the Best Business Intelligence Security Model for Your App
Securing ap is oauth and fine grained access control
Mobile Authentication - Moving Towards a Passwordless Future

Recently uploaded (20)

PPTX
Presentation of Computer CLASS 2 .pptx
PDF
Convert Thunderbird to Outlook into bulk
PDF
Micromaid: A simple Mermaid-like chart generator for Pharo
PDF
Jenkins: An open-source automation server powering CI/CD Automation
PDF
Teaching Reproducibility and Embracing Variability: From Floating-Point Exper...
PDF
Become an Agentblazer Champion Challenge
PPTX
Odoo Consulting Services by CandidRoot Solutions
PDF
Become an Agentblazer Champion Challenge Kickoff
PPTX
Visualising Data with Scatterplots in IBM SPSS Statistics.pptx
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
IEEE-CS Tech Predictions, SWEBOK and Quantum Software: Towards Q-SWEBOK
PPTX
Materi_Pemrograman_Komputer-Looping.pptx
PPTX
AIRLINE PRICE API | FLIGHT API COST |
PDF
Comprehensive Salesforce Implementation Services.pdf
PPTX
Hire Expert Blazor Developers | Scalable Solutions by OnestopDA
PDF
ShowUs: Pharo Stream Deck (ESUG 2025, Gdansk)
PPTX
Save Business Costs with CRM Software for Insurance Agents
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
DOCX
The Future of Smart Factories Why Embedded Analytics Leads the Way
PPTX
Materi-Enum-and-Record-Data-Type (1).pptx
Presentation of Computer CLASS 2 .pptx
Convert Thunderbird to Outlook into bulk
Micromaid: A simple Mermaid-like chart generator for Pharo
Jenkins: An open-source automation server powering CI/CD Automation
Teaching Reproducibility and Embracing Variability: From Floating-Point Exper...
Become an Agentblazer Champion Challenge
Odoo Consulting Services by CandidRoot Solutions
Become an Agentblazer Champion Challenge Kickoff
Visualising Data with Scatterplots in IBM SPSS Statistics.pptx
How to Migrate SBCGlobal Email to Yahoo Easily
IEEE-CS Tech Predictions, SWEBOK and Quantum Software: Towards Q-SWEBOK
Materi_Pemrograman_Komputer-Looping.pptx
AIRLINE PRICE API | FLIGHT API COST |
Comprehensive Salesforce Implementation Services.pdf
Hire Expert Blazor Developers | Scalable Solutions by OnestopDA
ShowUs: Pharo Stream Deck (ESUG 2025, Gdansk)
Save Business Costs with CRM Software for Insurance Agents
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
The Future of Smart Factories Why Embedded Analytics Leads the Way
Materi-Enum-and-Record-Data-Type (1).pptx

Single Sign On - The Basics

  • 1. Single Sign On – The Basics Ishan A B Ambanwela
  • 2. Contents ● What is SSO ● Not to be Confused with ● Pros & Cons ● SSO Approaches – By Configuration ● Types of SSO – Legacy SSO – Password Synchronization – Software Token Based Authentication ● Browser Session ● PC Login session – Mobile SSO ● Q&A
  • 3. What is SSO ● Single sign-on gives users the ability to access more than one protected resource (Web pages and applications) with one authentication.
  • 4. Not to be Confused with... ● Authentication vs Authorization ● Shared authentication schemes – Oauth – OpenID / OpenID Connect – Facebook Connect ● Single Sign Out
  • 5. Pros & Cons ● Reduced operational cost ● Reduced time to access data ● Improved user experience ● Ease burden on developers ● Centralized management of users ● Fine grained auditing ● Effective compliance ● Advanced security to systems – Smart cards, One time password tokens ● impractical in different levels of secure access ● increases the negative impact in case of credentials exposed ● makes the authentication systems highly critical ● Complex logics and pitfalls ● Should combined with strong authentication methods – Smart cards, One time password tokens
  • 6. SSO Approaches – By Configuration ● Smart card based ● Kerberos based ● SAML (Security Assertion Markup Language) ● Integrated Windows Authentication – An umbrella term for ● SPNEGO, Kerberos, and NTLMSSP
  • 7. Types of SSO ● Legacy SSO ● Password synchronization ● Software Token Based Authentication
  • 8. Legacy SSO ● aka - Enterprise or Employee SSO (eSSO) ● After primary authentication, it intercepts further login prompts and fills them for you ● Which is accomplished using – Script ● Which executes the real application with credentials – Background service ● Monitors for login prompts and pass credentials ● Products/Implementations – Citrix Password Manager, Imprivata eSSO appliance, PassLogix, Novell’s Secure Login
  • 9. Password Synchronization ● A process that coordinates passwords across multiple computers and devices and/or applications ● Each computer, device, application still authenticates but behind the scene ● Products/Implementations – MTech's P-Synch, Proginet's SecurPass, Systor's SAM Password Synchronization
  • 10. Software Token Based Authentication ● Allow users to enter their username and password in order to obtain a token ● Once their token has been obtained, the user can offer the token - which offers access to a specific resource for a time period - to the remote site instead of credentials ● Complex encryption with complex logic differentiates the implementations ● Usually associated with a session – Web SSO - Browser session – Other SSO - PC Log in session
  • 11. Web SSO ● Works for browser based applications ● Cookie support is required – Because token is kept in a cookie ● Usually single sign-on to applications deployed on a single web server (domain) ● Implementations – Jasig CAS
  • 12. PC Login session based SSO ● Works for all kinds of applications – Mail clients – Web applications ● Token is kept in user session ● Client application should implement this feature ● Implementations – Some Kerberos implementations – NTLM
  • 13. Mobile SSO ● Since Mobile Phone/Tab is a strictly personal device, SSO has not very significant role ● Can save all different passwords like in Legacy SSO ● As technology is getting complicated, SSO will be introduced in near future
  • 14. Q & A
  • 16. Thank you and Good luck :-)