Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
In this lesson course, participants will become familiar with the concept of a secure single sign-on (SSO). In the early days of information technology, someone may have to sign on to multiple systems individually using distinct credentials, creating time inefficiency and the potential for information insecurity through the use of simple passwords, or by writing passwords down. A domain structure is based on the concept of single sign-on (SSO). In SSO; the user provides credentials in return for a token, which will contain a list of the groups you have membership in. When you access a device your token (your group memberships) are compared against the access control list on that device; if you are on the list, then you'll be granted access to the device. SSO pros:
- Ease of use for end users
- Centralized control
- Ease of administration
SSO cons - Single point of failure
- Standards necessary
- Keys to the kingdom (if someone gets access to a password then they have access many resources)
Technology is moving toward the concept of a super sign on: we log in to one authentication server and we get an authentication token that is capable of traversing trusts throughout many different domains/organizations.