root
json
3 fields
summary
3 fields
totalEvaluated
38
totalIncluded
25
totalExcluded
13
included
3 fields
results
25 items
Index 0
8 fields
id
https://www.iso.org/information-security/identity-management
title
Identity management: What you need to know
url
https://www.iso.org/information-security/identity-management
publishedDate
Sep 3, 2024, 12:00:00 AM UTC
author
text
Modern-day security breaches like the SolarWinds or T-Mobile attacks are not one-off events; they are prime examples of how someone can steal your organizationâs credentials and use them to gain illegitimate privileged access to sensitive assets. Data breaches happen daily , and in too many places at once to keep count. They remind us that, regardless of our information security investments, business-critical resources can be compromised if access is not protected. Organizations depend on a variety of systems, applications and devices to run their operations, and users require access to these resources to do their jobs efficiently. Managing this can be a challenge, especially in large corporations with hundreds or thousands of users requiring personalized access. Identity and access management adds a layer of security by tracking, managing and securing the identities of individuals and their associated data. It helps keep track of who is who, so that people can access the information they are authorized to see and make the transactions they are permitted to make. Table of contents Enable Javascript to view table What is identity management? Identity management is the process of managing user identities and access privileges in a centralized way. It involves recording and controlling identities within an organization and enforcing identity governance policies. Simply put, your online identity is the profile that identifies who you are when using a network, whereas your access refers to what permissions you have once youâre logged in. Together, they form an important part of how you interact with technology â itâs how computers know itâs really you attempting to log in instead of someone else. Identity management in action Through identity and access management (IAM), only specified users in an organization are allowed to access and handle sensitive information. Here are a few examples of identity management at work: Identity creation and maintenance : By creating automated workflows for scenarios like a new hire or a role transition, IAM centralizes the identity and access management life cycle of a companyâs employees. This improves processing time for access and identity changes and reduces errors. Entitlement management : Life-cycle entitlements are assigned to individuals and their roles. For example, a production operator is able to view an online work procedure but may not be allowed to modify it. On the other hand, a supervisor will have the authority not only to view but to modify the file or create new ones. Identity proofing : Identity is at the core of a citizenâs everyday actions. Once the state has implemented a civil register, IAM enables governments to grant people the right to access their data (birth certificate, driverâs licence, etc.) and prove their identity. A number of identity and access management systems use role-based access control (RBAC). Under this approach, there are predefined job roles with specific sets of access privileges. For instance, if an HR employee is put in charge of training, it makes little sense to also give them access to pay role and salary files. There are many other forms of automatic access control that each come with a variety of features and technology. Sign up for email updates Register for additional resources and updates on IT and related technologies! Common features of identity management Many different forms of identity management software exist on the market and there is no official definition of what they must and must not include. However, a couple of essential features stand out: Single sign-on (SSO) : This is when users can access multiple applications and services from a single location, avoiding the need for different usernames and passwords. Two-factor authentication : This involves verifying someoneâs identity not just with their username and password, but also with another piece of information like a PIN or a token. Other features of identity management may include automatic provisioning of user accounts, password management, workflow, and compliance and audit services. In recent years, a new generation of identity management technologies has emerged, which focuses on ease of use in addition to security . Some examples are biometric authentication (such as fingerprints or facial recognition), multi-factor authentication (requiring several verification factors), and identity federation, whereby the responsibility for an individualâs or entityâs authentication is delegated to a trusted external party. SSO is an important aspect of federated ID management. These key features of identity management are shared by nearly all of todayâs identity management systems (IMS). An IMS is an online platform that helps organizations manage a range of identities in a secure and efficient manner. It integrates with various other systems within an organization, such as HR systems, e-commerce platforms and accounting software. How does identity management work? Broadly speaking, identity management systems perform three main tasks: identification , authentication and authorization . This enables the right people, depending on their job functions, to access the tools they need to perform their assigned duties â without granting them access to those they donât need. Identity and access â whatâs the difference? The terms âidentity managementâ and âaccess managementâ are often used interchangeably, but they are two distinct concepts. The crucial difference is that identity management deals with user accounts (authentication) while access management deals with permissions and privileges (authorization). Letâs take an example. When a user enters their login credentials, their identity is being checked against a database to verify if the entered credentials match the ones stored in the database â this is authentication. Once the userâs identity has been established, they are then granted access to the resources their account is cleared for â thatâs authorization. Identity management: whatâs in it for you? An identity management system is a valuable tool for protecting the information and resources of organizations of any size. It allows you to securely store user data and manage user access privileges, providing a secure and reliable way to keep your operations running smoothly. The benefits of identity management include the following: Increased security : An IMS helps protect your organization from unauthorized access and theft of user data. Improved efficiency : With an IMS, you can efficiently manage user login procedures and track user activity across multiple platforms using a single set of credentials. Reduced processing time/cost : An IMSâs automated workflows allow you to easily manage and administer user accounts, saving time and money on administrative tasks. Enhanced compliance : With an IMS, you can easily ensure compliance with regulations and standards, such as GDPR and HIPAA (see below). Deploying an identity management system The implementation of a sound identity management solution does not guarantee complete security, but adopting the following principles can make you less vulnerable to breaches and attacks from malicious actors. Here are a few tips to consider: Implement strong authentication methods (such as multi-factor authentication) to reduce the risk of unauthorized access. Regularly review access control policies to ensure that only authorized users have access to sensitive information and resources. Monitor and audit access to sensitive information and resources to detect and prevent unauthorized access. Frequently update user accounts to ensure they remain relevant and accurate. Implement a password management solution to reduce the risk of password-related security incidents, such as password reuse or password theft. What it means for compliance If identity and access management processes are not effectively controlled, you may be in non-compliance with industry standards or government regulations. The world is moving towards stricter regulations and standards for identity management â such as the European GDPR (which requires explicit consent from users for data collection) and the NIST 800-63 Digital Identity Guidelines in the US (a roadmap for IAM best practices). Several protocols exist to support strong IAM policies by securing data and ensuring its integrity during transfer . Generally known as âAuthentication, Authorization, Accountingâ, or AAA, these identity and access management protocols provide security standards to simplify access management, aid compliance and create a uniform system for managing interactions between users and systems. Although ISO compliance is not a legal requirement, ISO standards naturally align with the regulations of various sector. So complying with ISO/IEC 27001 for information security can prevent your organization from getting into legal trouble over crucial aspects of identity management. Based around segregation of duty and a âone user, one IDâ policy, it demonstrates that your corporate information is appropriately controlled. ISO/IEC 27001 Information security management systems ISO/IEC 24760-1 IT security and privacy â A framework for identity management ISO/IEC 27018 Protection of personally identifiable information (PII) in public clouds acting as PII processors Towards advanced identity management Complex compliance and security requirements are putting organizations under pressure more than ever before to protect their information, and challenge conventional ways of managing usersâ identities. Half a decade ago, passwords were as close as you would get to a digital identity. But modern approaches to authentication require more than just a password. The widespread adoption of cloud computing, whose scalability and flexibility make it an attractive proposition for most organizations, has placed a new layer of stress on information security. Today, passwordless logins using biometrics or multi-factor authentication provide an alternative to traditional authentication â but thatâs not enough. When it comes to securing data in multi-cloud environments, IT professionals view encryption as a critical security control. Storing identities on a blockchain has emerged as a solution that can provide immutable records of a given system without a centralized authority to manage them. As we contemplate our IAM future, it may not be long before blockchain-based identity systems become the norm for keeping a userâs data safe and secure.
image
https://www.iso.org/files/live/sites/isoorg/files/news/insights/information-security/Info%20sec_Identity%20management.png/thumbnails/1200x600
favicon
https://www.iso.org/modules/isoorg-template/img/iso/favicon/red/apple-touch-icon-152x152-precomposed.png
Index 1
7 fields
id
https://www.w3.org/community/fed-id/2022/04/21/introduction-to-federated-identity-and-the-fedid-cg/
title
Introduction to Federated Identity and the FedID CG | Federated Identity Community Group
url
https://www.w3.org/community/fed-id/2022/04/21/introduction-to-federated-identity-and-the-fedid-cg/
publishedDate
Apr 21, 2022, 12:00:00 AM UTC
author
Heather Flanagan |
text
The audience for this post is people who are unfamiliar with how privacy concerns may impact federated identity. That likely includes people from one of two groups: 1) people who are interested in privacy, but are new to the concept of federated identity, or 2) people who are familiar with federated identity, but are unaware of the changes being made to browsers because of the privacy concerns. The goal of the post is to provide an introduction to federated identity and why it matters, what the privacy changes are and their potential impact, and then describe how FedID CG is working to preserve federated identity in light of the privacy-related changes. Federated Identity encompasses the technologies, standards, and use cases in which the user identification and user authentication services are separated from the service providing the resource a user is trying to access. The organizations providing the user identification/authentication services are generally referred to as Identity Providers, and the organizations that utilize their services are often referred to as Relying Parties. Federated identity makes it possible for a website, app, and/or API to outsource authentication to an external entity. In practice, users with an account with entity A can gain access to web apps B and C without having to create new usernames and passwords, if B and C outsource authentication. Sometimes referred to as Single Sign-On, or SSO, there is a distinction to be made between SSO and federated identity. SSO is a property of federated identity that makes it possible for a user to gain access to distinct web apps or API without having to reenter credentials. The broader use of federated identity is when the resources involved are located in different security domains and are owned by different organizations. The types of organizations that use federated identity are as varied as the internet. Itâs a common practice to use federated identity to streamline account management and access by allowing users to log in with an identity provider account (those âLog in with Facebookâ, âLog in with Googleâ, âLog in with âŚâ buttons.). Itâs also commonly used by businesses to manage their employeesâ access to company resources. Universities use federated identity to offer students multi-institutional academic programs, to provide shared access to educational resources, and for research collaboration. Federal institutions use federated identity to manage access to federal resources too â as do financial institutions. And for one final example, itâs also frequently used in Software-as-a-Service business models as well. Federated identity significantly reduces the burden on users by limiting account proliferation. It streamlines the user experience, lowers the security risks associated with password re-use (e.g., credential stuffing attacks), decreases the raw number of access credentials that a user has to remember and manage, and facilitates inter-organizational relationships and management. However, linking a userâs identity across systems also raises privacy concerns, especially when done across organizations/entities (and to a much lesser extent even when the resources are all owned by the same organization). While the objective of federated identity systems is to facilitate a userâs access to resources online, it was originally designed on top of web primitives (e.g. third-party cookies, top-level navigations, etc). These primitives can and are being abused to track users without their consent or full understanding. In response to these concerns, user-agents are making changes to how they work with some of the fundamental primitives of the web to prevent the uncontrolled, hidden tracking of users. Since federated identity often utilizes these same primitives to exchange necessary information to complete authentication flows, we need to develop solutions that address these privacy concerns without breaking federated identity. There are a variety of privacy-related interventions that user-agents are exploring. These include deprecating third-party cookies, controlling access to the clientâs web storage, removing certain parameters from links (often referred to as link decoration), and restricting the capabilities of navigational redirects. Federated identity often relies on these same mechanisms, and so the changes being made to improve support for end-user privacy are having an effect on federated identity systems. Since the most immediate change is the deprecation of third-party cookies (having already been deployed in Safari and Firefox, and publicly planned for Chrome in late 2023), the Federated Identity Community Group (FedID CG) is currently focusing most of its attention on the impact of that change. The group is working to preserve federation when third-party cookies are deprecated. The FedID CG meets every week to provide feedback on the proposals that are relevant to federated identity. The full charter for the group can be found here . If youâre interested in learning more, we are currently working on a draft report that will be published shortly. If youâd like to participate in the group, you can join FedID CG here . Please note that while a W3C account is required to join, you do not need to be a member of the W3C. If you donât have a W3C account, you can sign up for one on the W3C account request page .
favicon
https://www.w3.org/community/fed-id/wp-content/themes/StoryTeller/favicon.ico
Index 2
7 fields
id
https://datatracker.ietf.org/doc/draft-biggs-acme-sso/
title
Automated Certificate Management Environment (ACME) Extension for Single Sign On Challenges
url
https://datatracker.ietf.org/doc/draft-biggs-acme-sso/
publishedDate
Apr 8, 2021, 12:00:00 AM UTC
author
text
Abstract This document specifies an extension to the ACME protocol [RFC8555] to enable ACME servers to validate a client's control of an email identifier using single sign-on (SSO) technologies. An extension to the CAA [RFC8659] resource record specification is also defined to provide domain owners a means to declare a set of SSO providers that ACME servers may rely upon when employing SSO for identifier validation on their domain. Authors Andrew Biggs Richard Barnes Moynihan (Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)
favicon
https://static.ietf.org/dt/12.37.0/ietf/images/ietf-logo-nor-32.png
Index 3
7 fields
id
https://en.wikipedia.org/wiki/Single_sign-on
title
Single sign-on
url
https://en.wikipedia.org/wiki/Single_sign-on
publishedDate
Jun 5, 2024, 7:13:50 AM UTC
author
Contributors to Wikimedia projects
text
From Wikipedia, the free encyclopedia Single sign-on ( SSO ) is an authentication scheme that allows a user to log in with a single ID to any of several related, yet independent, software systems. True single sign-on allows the user to log in once and access services without re-entering authentication factors. It should not be confused with same-sign on (Directory Server Authentication), often accomplished by using the Lightweight Directory Access Protocol (LDAP) and stored LDAP databases on (directory) servers. [1] [2] A simple version of single sign-on can be achieved over IP networks using cookies but only if the sites share a common DNS parent domain. [3] For clarity, a distinction is made between Directory Server Authentication (same-sign on) and single sign-on: Directory Server Authentication refers to systems requiring authentication for each application but using the same credentials from a directory server, whereas single sign-on refers to systems where a single authentication provides access to multiple applications by passing the authentication token seamlessly to configured applications. Conversely, single sign-off or single log-out ( SLO ) is the property whereby a single action of signing out terminates access to multiple software systems. As different applications and resources support different authentication mechanisms, single sign-on must internally store the credentials used for initial authentication and translate them to the credentials required for the different mechanisms. Other shared authentication schemes, such as OpenID and OpenID Connect , offer other services that may require users to make choices during a sign-on to a resource, but can be configured for single sign-on if those other services (such as user consent) are disabled. [4] An increasing number of federated social logons, like Facebook Connect , do require the user to enter consent choices upon first registration with a new resource, and so are not always single sign-on in the strictest sense. Benefits [ edit ] Benefits of using single sign-on include: Mitigate risk for access to 3rd-party sites ("federated authentication") [5] because user passwords are not stored or managed externally Reduce password fatigue from different username and password combinations Reduce time spent re-entering passwords for the same identity [5] Reduce IT costs due to lower number of IT help desk calls about passwords [6] Simpler administration. SSO-related tasks are performed transparently as part of normal maintenance, using the same tools that are used for other administrative tasks. Better administrative control. All network management information is stored in a single repository. This means that there is a single, authoritative listing of each user's rights and privileges. This allows the administrator to change a user's privileges and know that the results will propagate network wide. Improved user productivity. Users are no longer bogged down by multiple logons, nor are they required to remember multiple passwords in order to access network resources. This is also a benefit to Help desk personnel, who need to field fewer requests for forgotten passwords. Better network security. Eliminating multiple passwords also reduces a common source of security breachesâusers writing down their passwords. Finally, because of the consolidation of network management information, the administrator can know with certainty that when he disables a user's account, the account is fully disabled. Consolidation of heterogeneous networks. By joining disparate networks, administrative efforts can be consolidated, ensuring that administrative best practices and corporate security policies are being consistently enforced. SSO shares centralized authentication servers that all other applications and systems use for authentication purposes and combines this with techniques to ensure that users do not have to actively enter their credentials more than once. Criticism [ edit ] The term reduced sign-on (RSO) has been used by some to reflect the fact that single sign-on is impractical in addressing the need for different levels of secure access in the enterprise, and as such more than one authentication server may be necessary. [7] As single sign-on provides access to many resources once the user is initially authenticated ("keys to the castle"), it increases the negative impact in case the credentials are available to other people and misused. Therefore, single sign-on requires an increased focus on the protection of the user credentials, and should ideally be combined with strong authentication methods like smart cards and one-time password tokens. [7] Single sign-on also increases dependence on highly-available authentication systems; a loss of their availability can result in denial of access to all systems unified under the SSO. SSO can be configured with session failover capabilities in order to maintain the system operation. [8] Nonetheless, the risk of system failure may make single sign-on undesirable for systems to which access must be guaranteed at all times, such as security or plant-floor systems. Furthermore, the use of single-sign-on techniques utilizing social networking services such as Facebook may render third party websites unusable within libraries, schools, or workplaces that block social media sites for productivity reasons. It can also cause difficulties in countries with active censorship regimes, such as China and its " Golden Shield Project ", where the third party website may not be actively censored, but is effectively blocked if a user's social login is blocked. [9] [10] Security [ edit ] In March 2012, [11] a research paper reported an extensive study on the security of social login mechanisms. The authors found 8 serious logic flaws in high-profile ID providers and relying party websites, such as OpenID (including Google ID and PayPal Access), Facebook , Janrain , Freelancer , FarmVille , and Sears.com . Because the researchers informed ID providers and relying party websites prior to public announcement of the discovery of the flaws, the vulnerabilities were corrected, and there have been no security breaches reported. [12] In May 2014, a vulnerability named Covert Redirect was disclosed. [13] It was first reported "Covert Redirect Vulnerability Related to OAuth 2.0 and OpenID" by its discoverer Wang Jing, a Mathematical PhD student from Nanyang Technological University , Singapore. [14] [15] [16] In fact, almost all [ weasel words ] Single sign-on protocols are affected. Covert Redirect takes advantage of third-party clients susceptible to an XSS or Open Redirect. [17] In December 2020, flaws in federated authentication systems were discovered to have been utilized by attackers during the 2020 United States federal government data breach . [18] [19] Due to how single sign-on works, by sending a request to the logged-in website to get a SSO token and sending a request with the token to the logged-out website, the token cannot be protected with the HttpOnly cookie flag and thus can be stolen by an attacker if there is an XSS vulnerability on the logged-out website, in order to do session hijacking . Another security issue is that if the session used for SSO is stolen (which can be protected with the HttpOnly cookie flag unlike the SSO token), the attacker can access all the websites that are using the SSO system. [20] Privacy [ edit ] As originally implemented in Kerberos and SAML, single sign-on did not give users any choices about releasing their personal information to each new resource that the user visited. This worked well enough within a single enterprise, like MIT where Kerberos was invented, or major corporations where all of the resources were internal sites. However, as federated services like Active Directory Federation Services proliferated, the user's private information was sent out to affiliated sites not under control of the enterprise that collected the data from the user. Since privacy regulations are now tightening with legislation like the GDPR , the newer methods like OpenID Connect have started to become more attractive; for example MIT, the originator of Kerberos, now supports OpenID Connect . [21] Email address [ edit ] Single sign-on in theory can work without revealing identifying information such as email addresses to the relying party (credential consumer), but many credential providers do not allow users to configure what information is passed on to the credential consumer. As of 2019, Google and Facebook sign-in do not require users to share email addresses with the credential consumer. " Sign in with Apple " introduced in iOS 13 allows a user to request a unique relay email address each time the user signs up for a new service, thus reducing the likelihood of account linking by the credential consumer. [22] Common configurations [ edit ] Kerberos-based [ edit ] Initial sign-on prompts the user for credentials, and gets a Kerberos ticket-granting ticket (TGT). Additional software applications requiring authentication, such as email clients , wikis , and revision-control systems, use the ticket-granting ticket to acquire service tickets, proving the user's identity to the mail-server / wiki server / etc. without prompting the user to re-enter credentials. Windows environment - Windows login fetches TGT. Active Directory -aware applications fetch service tickets, so the user is not prompted to re-authenticate. Unix / Linux environment - Login via Kerberos PAM modules fetches TGT. Kerberized client applications such as Evolution , Firefox , and SVN use service tickets, so the user is not prompted to re-authenticate. Smart-card-based [ edit ] Initial sign-on prompts the user for the smart card . Additional software applications also use the smart card, without prompting the user to re-enter credentials. Smart-card-based single sign-on can either use certificates or passwords stored on the smart card. Integrated Windows Authentication [ edit ] Integrated Windows Authentication is a term associated with Microsoft products and refers to the SPNEGO , Kerberos , and NTLMSSP authentication protocols with respect to SSPI functionality introduced with Microsoft Windows 2000 and included with later Windows NT -based operating systems. The term is most commonly used to refer to the automatically authenticated connections between Microsoft Internet Information Services and Internet Explorer . Cross-platform Active Directory integration vendors have extended the Integrated Windows Authentication paradigm to Unix (including Mac) and Linux systems. Security Assertion Markup Language [ edit ] Security Assertion Markup Language (SAML) is an XML -based method for exchanging user security information between an SAML identity provider and a SAML service provider . SAML 2.0 supports W3C XML encryption and service-providerâinitiated web browser single sign-on exchanges. [23] A user wielding a user agent (usually a web browser) is called the subject in SAML-based single sign-on. The user requests a web resource protected by a SAML service provider. The service provider, wishing to know the identity of the user, issues an authentication request to a SAML identity provider through the user agent. The identity provider is the one that provides the user credentials. The service provider trusts the user information from the identity provider to provide access to its services or resources. Emerging configurations [ edit ] Mobile devices as access credentials [ edit ] A newer variation of single-sign-on authentication has been developed using mobile devices as access credentials. Users' mobile devices can be used to automatically log them onto multiple systems, such as building-access-control systems and computer systems, through the use of authentication methods which include OpenID Connect and SAML, [24] in conjunction with an X.509 ITU-T cryptography certificate used to identify the mobile device to an access server. A mobile device is "something you have", as opposed to a password which is "something you know", or biometrics (fingerprint, retinal scan, facial recognition, etc.) which is "something you are". Security experts recommend using at least two out of these three factors ( multi-factor authentication ) for best protection. See also [ edit ] Account pre-hijacking Central Authentication Service Identity management Identity management systems List of single sign-on implementations Password manager Security Assertion Markup Language Usability of web authentication systems References [ edit ] ^ "What's the Difference b/w SSO (Single Sign On) & LDAP?" . JumpCloud . 2019-05-14 . Retrieved 2020-10-27 . ^ "SSO and LDAP Authentication" . Authenticationworld.com. Archived from the original on 2014-05-23 . Retrieved 2014-05-23 . ^ "OpenID versus Single-Sign-On Server" . alleged.org.uk. 2007-08-13 . Retrieved 2014-05-23 . ^ "OpenID Connect Provider - OpenID Connect Single Sign-On (SSO) - OIDC OAuth Authentication" . OneLogin . ^ a b "Single sign-on and federated authentication" . kb.iu.edu . ^ "Benefits of SSO" . University of Guelph . Retrieved 2014-05-23 . ^ a b "Single Sign On Authentication" . Authenticationworld.com. Archived from the original on 2014-03-15 . Retrieved 2013-05-28 . ^ "Sun GlassFish Enterprise Server v2.1.1 High Availability Administration Guide" . Oracle.com . Retrieved 2013-05-28 . ^ Laurenson, Lydia (3 May 2014). "The Censorship Effect" . TechCrunch . Archived from the original on August 7, 2020 . Retrieved 27 February 2015 . ^ Chester, Ken (12 August 2013). "Censorship, external authentication, and other social media lessons from China's Great Firewall" . Tech in Asia . Archived from the original on March 26, 2014 . Retrieved 9 March 2016 . ^ Wang, Rui; Chen, Shuo; Wang, XiaoFeng (2012). "Signing Me onto Your Accounts through Facebook and Google: A Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services" . 2012 IEEE Symposium on Security and Privacy . pp. 365â379. doi : 10.1109/SP.2012.30 . ISBN 978-1-4673-1244-8 . S2CID 1679661 . ^ "OpenID: Vulnerability report, Data confusion" - OpenID Foundation, March 14, 2012 ^ "Facebook, Google Users Threatened by New Security Flaw" . Tom's Guide. 2 May 2014 . Retrieved 11 November 2014 . ^ "Covert Redirect Vulnerability Related to OAuth 2.0 and OpenID" . Tetraph. 1 May 2014 . Retrieved 10 November 2014 . ^ "Math student detects OAuth, OpenID security vulnerability" . Tech Xplore. 3 May 2014 . Retrieved 10 November 2014 . ^ "Facebook, Google Users Threatened by New Security Flaw" . Yahoo. 2 May 2014 . Retrieved 10 November 2014 . ^ "Covert Redirect Flaw in OAuth is Not the Next Heartbleed" . Symantec. 3 May 2014 . Retrieved 10 November 2014 . ^ "VMware Flaw a Vector in SolarWinds Breach? â Krebs on Security" . 19 December 2020. ^ Kovacs, Eduard (15 December 2020). "Group Behind SolarWinds Hack Bypassed MFA to Access Emails at US Think Tank" . Security Week . Retrieved 19 December 2020 . ^ "What Is Session Hijacking?" . 22 August 2019. ^ MIT IST. "OpenID Connect Authorization" . ^ Goode, Lauren (2019-06-15). "App Makers Are Mixed on 'Sign In With Apple' " . Wired . ISSN 1059-1028 . Retrieved 2019-06-15 . ^ Armando, Alessandro; Carbone, Roberto; Compagna, Luca; CuĂŠllar, Jorge; Pellegrino, Giancarlo; Sorniotti, Alessandro (2013-03-01). "An authentication flaw in browser-based Single Sign-On protocols: Impact and remediations" . Computers & Security . 33 : 41â58. doi : 10.1016/j.cose.2012.08.007 . ^ "MicroStrategy's office of the future includes mobile identity and cybersecurity" . The Washington Post . 2014-04-14 . Retrieved 2014-03-30 . External links [ edit ] Single sign-on intro with diagrams
favicon
https://en.wikipedia.org/static/apple-touch/wikipedia.png
Index 4
8 fields
id
https://stackoverflow.com/questions/35663357/how-does-sso-single-sign-on-work
title
How does SSO (Single Sign On) work
url
https://stackoverflow.com/questions/35663357/how-does-sso-single-sign-on-work
root
Copy
object
Copy