The outcome of a good access control implementation is single sign-on (SSO) or one-time login. SSO also provides end-user convenience. The implementation of SSO is rarely a sinecure. In particular, the wide variety of applications and systems makes the deployment of SSO a specialist discipline. SSO is possible by standardising on and using technology such as SAML, Kerberos, OpenID-Connect and/or OAUTH 2.0. In the cases where it is not possible to standardise, there are specific technologies that simulate SSO.
The principle of Single Sign-On (SSO) is an instant authentication for a host of systems. A user needs to log on once, subsequently its credentials are automatically presented to applications that request it. SSO is operating successfully in a vastly growing number of organizations.
Larger companies particularly appreciate the benefits of increased productivity and ease of use, whereby Enterprise Single Sign-On (ESSO) grows in significance. This expanded SSO application, the user is logging on once, permitting comprehensive access to all systems of the organization – including web environment and cloud applications.
To counter potential vulnerabilities inherent to this approach, many ESSO solutions apply strong authentication requirements, such as tokens.
Single sign-on for your organization?
For further inquiries concerning Access Control and related challenges please contact us . Traxion has been active since the 1990s as an authority and a partner in this domain.