1 / 2

Single Sign On

Deliver secure, seamless access to your resources with a leading SSO provider. Ping Identityu2019s single sign-on solution provides authentication for the workforce, partner and customer identities to SaaS, web apps, mobile apps, and APIs, no matter where theyu2019re hosted.

Download Presentation

Single Sign On

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Key Benefits and Implementation of Single Sign On Single sign-on (SSO) is an authentication process that allows the user to access multiple applications with one of passwords. It is a standard procedure in large companies, where clients access various resources connected to single LAN network. The user doesn’t need to remember different sets of credentials as it can be confusing for them. The most common example of single sign-in is Google. Once you are logged in into Gmail user can access every application of it like; YouTube, Google drive, photos, and Play store. S O S authentication facilitates seamless network resource usage. SSO mechanisms vary depending on applications. It is not suited for systems requiring guaranteed access, as the loss of log-in credentials results into denial of access to all networks. They are used with other techniques, such as smart cards and OTP tokens. Key Benefits Of Using SSO: • Eliminates the time required for entering credentials thus improving the productivity for users and increasing conversation rates and makes sure user don’t need to hassle for maintaining another set of credentials. Reduce complaints regarding passwords, thus reducing the cost associated with setting up of several helpdesks. Minimize phishing, thus improving security. • • Single Sign On uses Security Assertion Markup Language (SAML) to simplify the login process. SAML takes advantage of concepts in cryptography to distribute tokens from Onelogin to different applications, granting application access in a manner that does not involve password. SAML is the foundation of Onelogin SSO technology and is a great way to secure employees logins. It uses secure tokens which are digitally signed and encrypted messages with authentication and

  2. authorization data such user’s e-mail and company role. These tokens are passed from an identity provider to a cloud application with an established trust relationship. Although it is around for a quite while, it is gaining widespread adaptation as it improves customer satisfaction. SSO is designed in such a way that it enhances the user experience during login by making the process quick and simple. A user-friendly login process can be essential because the login screen is where the first interaction between the user and inner halls of the website will be taking place. If those users are customers, you would want their experience to be great from the start. Sometimes during multiple login users forgets the password and need to call the helpdesk for solving the issue, this takes a lot of time and productivity decreases. Hence having to remember the password and key for only one time significantly cuts down the login time so the employee can work efficiently and with accuracy. The Primary Process of SSO: • • The first step is logging into the main service (Facebook, Google, Twitter, etc.) When a user visits a new service, it redirects you to the main page to check if you are logged in at that one. An OTP token is returned. The OTP generated is verified by new service form parental server and only after successful verification user is granted access. • •

More Related