1 / 7

Single sign-on

Single sign-on. Secure password store Mats Byfuglien. The task. Create a mobile solution for automated SSO Mobile with Java MIDlet USB device with Bluetooth support configured as an external keyboard Security analysis Usability analysis. Research questions.

ban
Download Presentation

Single sign-on

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Single sign-on Secure password store Mats Byfuglien

  2. The task • Create a mobile solution for automated SSO • Mobile with Java MIDlet • USB device with Bluetooth support configured as an external keyboard • Security analysis • Usability analysis

  3. Research questions • Does other alternative SSO solutions exist, if so - how are their security and usability? • How will different storage methods affect functionality and security of the solution? • What methods exist for transferring passwords securely between the mobile device and the computer, and how secure are they? • How secure is the prototype developed in this thesis? • How user friendly is the prototype developed in this thesis?

  4. State of the art – SSO solutions • Personal SSO solutions • Virtual Safe • Auto complete logon forms • Web-based SSO solutions • Microsoft Passport • Mobile SSO solution • No support for automated logons • Business solutions • Kerberos • Expensive, complex to configure

  5. Methods • Literature study • Other SSO solutions • Evaluate each system on security and usability • Crypto Algorithms • Performance • API’s available • Protocol analysis • Possible attacks • Implementing the prototype • Security and usability analysis • Test group • Survey • Interview • Compare prototype with SSO solutions from literature study

  6. Plan of progress • Literature study • Beg. January – beg. February • Planning and designing the solution • Beg February – mid. February • Implementation and testing • Mid February – beg April • Security and usability analysis • Mid April – beg. May • Write report • Beg. May – end June

  7. Risk analysis

More Related