Single sign-on (SSO) is a session and also user authentication service that permits a user to use one set of login credentials -- for example, a name and also password -- to access multiple applications. SSO have the right to be provided by enterprises, smaller sized organizations and also individuals to ease the administration of assorted usernames and passwords.

You are watching: Which of the following best describes a single sign on account?

In a straightforward web SSO service, anagentmodule on the applications server retrieves the specific authentication credentials for an separation, personal, instance user from a specialized SSOpolicy server, when authenticating the user versus a userrepository, such together a Lightweight Directory accessibility Protocol (LDAP) directory. The business authenticates the end user for every the applications the user has actually been provided rights to and also eliminates future password prompts because that individual applications throughout the exact same session.

How solitary sign-on works

Single sign-on is afederated identification management(FIM) arrangement, and the usage of such a device is sometimes calledidentity federation.OAuth, which stands for open Authorization and is pronounce \"oh-auth,\" is the frame that enables an end user\"s account information to be supplied by third-party services, such together Facebook, there is no exposing the user\"s password.

\"*\"
This graphic gives a image of how solitary sign-on works

OAuth acts together an intermediary on instead of of the finish user by providing the company with an access token the authorizes details account information to be shared. Once a user make the efforts to access an applications from the service provider, the organization provider will send a inquiry to the identification provider because that authentication. The organization provider will then verify the authentication and log the user in.

Types of SSO configurations

Some SSO services use protocols, such asKerberos, and also Security delinquent Markup Language (SAML).


Security risks and also SSO

Although solitary sign-on is a convenience to users, it presents dangers to enterprise security. One attacker who gains control over a user\"s SSO credentials will be granted access to every application the user has actually rights to, enhancing the amount of potential damage. In bespeak to protect against malicious access, it\"s important that every aspect of SSO implementation be combination withidentity governance. Establishments can additionally use two-factor authentication (2FA) or multifactor authentication (MFA) v SSO to enhance security.

Social SSO

Google, LinkedIn, Twitter and also Facebook offer well-known SSO servicesthat permit an end user to log in in to a third-party application with their society media authentication credentials. Although social solitary sign-on is a convenience to users, that can current security risks since it create a single point of failure that can be exploited through attackers.

Many security specialists recommend that finish users stop from using social SSO servicesaltogether because, when an attacker gains regulate over a user\"s SSO credentials, they will be able to accessibility all other applications that use the same credentials.

Apple recently unveiled the own solitary sign-on service and is positioning it as a more private alternate to the SSO options provided by Google, Facebook, LinkedIn and Twitter. The brand-new offering, which will certainly be referred to as Sign in with Apple, is meant to border what data third-party services have the right to access. Apple\"s SSO will also enhance security by requiring customers to usage 2FA on all Apple ID account to assistance integration with challenge ID and also Touch id on iOS devices.

See more: Have Faith In Me A Day To Remember Lyrics, A Day To Remember

Enterprise SSO

Enterprise solitary sign-on (eSSO) software products and services are password supervisors with customer and server components that log in the user on to target applications by replaying user credentials. This credentials are almost always a username and password; target applications perform not need to be modification to work-related with the eSSO system.

Advantages and also disadvantages of SSO

Advantages the SSO include the following:

It enables users to remember and also manage fewer passwords and usernames because that each application. It streamlines the process of signing on and also using applications -- no need to reenter passwords. It lessens the opportunity of phishing.

Disadvantages of SSO encompass the following:

that does no address specific levels of protection each applications sign-on may need. If access is lost, climate users space locked the end of the lot of systems linked to the SSO. If innocuous users acquire access, then they can gain accessibility to more than one application.

SSO vendors

There space multiple SSO merchants that room well known. Some carry out other services, and SSO is second feature. SSO vendors incorporate the following:

Rippling enables users to authorize in to cloud applications indigenous multiple devices. OneLogin is a cloud-based identification and accessibility management (IAM) platform the supports SSO. Okta is a tool with an SSO functionality. Okta likewise supports 2FA and also is primarily utilized by enterprise users.
Related Termsfederated identification management (FIM)Federated identification management (FIM) is an setup between lot of enterprises or domain names that permits their users to use the... Seecompletedefinitionidentity providerAn identification provider is a device component that is may be to carry out an end user or internet-connected device with a single collection of ... SeecompletedefinitionWhat is identity and accessibility management? guide to IAMIdentity and accessibility management (IAM) is a structure of organization processes, policies and technologies the facilitates the ... Seecompletedefinition