From the course: Authentication Systems for Identity and Access Managers (IAM): From Multi-Factor Methods to Federation Services
Unlock this course with a free trial
Join today to access over 25,100 courses taught by industry experts.
SSO implementation: Deploying single sign-on for enterprise applications
From the course: Authentication Systems for Identity and Access Managers (IAM): From Multi-Factor Methods to Federation Services
SSO implementation: Deploying single sign-on for enterprise applications
What is single sign-on? Single sign-on is the ability to go into multiple applications that require authentication, and then will authorize what you can do within those applications through an authentication method. You think about a username and password, but as we've been talking about, of course authentication is more than usernames and passwords. It can be other things as well, such as multi-factor authentication. The way single sign-on works is through a few different protocols. It can use SAML, which is an XML-based authentication protocol, normally used within web applications, OpenID, which is run on JSON and REST protocols, or OAuth 2.0, which is on top of the OpenID standards. So there's multiple ways and when to use open authentication and single sign-on and other types of single sign-on. The most common way is through a client device. You request a access to an application or a service or a resource, and automatically your credentials that you've already used to sign on…
Contents
-
-
-
(Locked)
Authentication methods: Implementing passwords, MFA, biometrics, and passwordless solutions18m 14s
-
(Locked)
MFA security and attacks8m 15s
-
(Locked)
AI attacks against MFA: Possible future attack trends7m 44s
-
(Locked)
SSO implementation: Deploying single sign-on for enterprise applications3m 5s
-
(Locked)
SSO attacks and weaknesses7m 6s
-
(Locked)
Federation services: Configuring identity federation between organizations and systems8m 7s
-
(Locked)
Authentication policy: Creating and enforcing organizational authentication requirements9m 22s
-
(Locked)
Alternatives to traditional authentication systems13m 6s
-
(Locked)
Validating and auditing15m 14s
-
(Locked)