SlideShare une entreprise Scribd logo
1  sur  21
Télécharger pour lire hors ligne
djlogo.jpg
Lecture #9: Single Sign on and Federation Identity
Management
Dr.Ramchandra Mangrulkar
August 19, 2020
Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 1 / 21
djlogo.jpg
Identity Management
Identity management refers to the policies, processes, and technologies that
establish user identities and enforce rules about access to digital resources.
People use the Internet to manage finances, access employer resources, shop,
and communicate.
Activity involves interacting with a service provider.
Typically require that each user have a digital identity.
Management of digital identity is an issue.
Hence, Identity management.
Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 2 / 21
djlogo.jpg
Prior to Identity Management
Each service provider maintains a set of user identities
Users have many identities
Becomes a management burden
Creates potential points of failure
Privacy violations and identity theft
Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 3 / 21
djlogo.jpg
Federated Identity Management
A Federation is a group of providers that trust each other’s credentials.
e.g. ATM card works with various bank federations such as Dena,SBI, HDFC
etc.
Sometimes called identity federation.
User can authenticate to one domain and then access resources in the other
domain without having to perform a separate login process.
Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 4 / 21
djlogo.jpg
Single Sign On (SSO)
Single Sign-on (SSO) occurs when a user logs in to one application and is
then signed in to other applications automatically, regardless of the platform,
technology, or domain the user is using.
example, if you log in to a Google service such as Gmail, you are
automatically authenticated to YouTube, AdSense, Google Analytics, and
other Google apps.
example, if you have office 365 login, then u can easily access all the office
apps such as One Drive, Microsoft Power Automate, Power BI, Stream,
Yammer etc.
Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 5 / 21
djlogo.jpg
Single Sign On (SSO) Components
Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 6 / 21
djlogo.jpg
SSO Sessions
Single Sign-on and Single Logout are possible through the use of sessions.
Three different sessions for a user with SSO:
Local session maintained by the application
Authorization Server session, if SSO is enabled
Identity Provider session, if the user chose to log in through an Identity
Provider
Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 7 / 21
djlogo.jpg
SSO Protocolsa
ahttps://auth0.com/docs/sso#saml-and-ws-federation
SAML and WS-Federation
Three different sessions for a user with SSO:
Local session maintained by the application
Authorization Server session, if SSO is enabled
Identity Provider session, if the user chose to log in through an Identity
Provider
Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 8 / 21
djlogo.jpg
Demonstration of Single Sign On (SSO)
SSO concept is used to access Two different Applications viz. Power BI and
Power Automate with the help of office credientials.
Microsoft office credentials (Identity Management Server)
Microsoft Power BI (Application 1)
Microsoft Power Automate (Application 2)
Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 9 / 21
djlogo.jpg
Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 10 / 21
djlogo.jpg
Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 11 / 21
djlogo.jpg
Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 12 / 21
djlogo.jpg
Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 13 / 21
djlogo.jpg
Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 14 / 21
djlogo.jpg
Office Sign-in
Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 15 / 21
djlogo.jpg
Power Automate
Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 16 / 21
djlogo.jpg
Power BI
Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 17 / 21
djlogo.jpg
Demonstration of Federated Identity Management (FIM)
SSO and FIM together, Overleaf is accessed with the help of IEEE
Credentials, Google Credentials or Twitter Credentials.
Slideshare can be accessed with Linkedin and Facebook credentials.
Google Credentials (Identity Management Server)
Google Drive (Application 1) -SSO
Google Doc (Application 2) - SSO
Overleaf - FIM (IEEE, Google, Twitter)
Slideshare - FIM (Linkedin, Facebook)
Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 18 / 21
djlogo.jpg
Overleaf Application
Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 19 / 21
djlogo.jpg
Linkedin Application
Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 20 / 21
djlogo.jpg
Self Study: Microsoft Active Directory Federation Service
https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs-
overview
Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 21 / 21

Contenu connexe

Tendances

Operational CyberSecurity Final Case Report
Operational CyberSecurity Final Case ReportOperational CyberSecurity Final Case Report
Operational CyberSecurity Final Case Report
James Konderla
 
Synopsis & toc sectoral capsule on cyber security market in india
Synopsis & toc  sectoral capsule on cyber security market in indiaSynopsis & toc  sectoral capsule on cyber security market in india
Synopsis & toc sectoral capsule on cyber security market in india
Gyan Research And Analytics
 

Tendances (20)

IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?
 
Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...
 
Software Piracy Protection
Software Piracy ProtectionSoftware Piracy Protection
Software Piracy Protection
 
IRJET- Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
IRJET-  	  Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...IRJET-  	  Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
IRJET- Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
 
Fundamentals of Information Systems Security Chapter 11
Fundamentals of Information Systems Security Chapter 11Fundamentals of Information Systems Security Chapter 11
Fundamentals of Information Systems Security Chapter 11
 
SecureDroid: An Android Security Framework Extension for Context-Aware policy...
SecureDroid: An Android Security Framework Extension for Context-Aware policy...SecureDroid: An Android Security Framework Extension for Context-Aware policy...
SecureDroid: An Android Security Framework Extension for Context-Aware policy...
 
System and Enterprise Security Project - Penetration Testing
System and Enterprise Security Project - Penetration TestingSystem and Enterprise Security Project - Penetration Testing
System and Enterprise Security Project - Penetration Testing
 
Lecture #31 : Windows Forensics
Lecture #31 : Windows ForensicsLecture #31 : Windows Forensics
Lecture #31 : Windows Forensics
 
Android Security : A Hacker's Perspective
Android Security : A Hacker's PerspectiveAndroid Security : A Hacker's Perspective
Android Security : A Hacker's Perspective
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Cis 333 Education Redefined - snaptutorial.com
Cis 333     Education Redefined - snaptutorial.comCis 333     Education Redefined - snaptutorial.com
Cis 333 Education Redefined - snaptutorial.com
 
Emerging application and data protection for cloud
Emerging application and data protection for cloudEmerging application and data protection for cloud
Emerging application and data protection for cloud
 
Distributed Denial of Service (DDos) Testing Methodology
Distributed Denial of Service (DDos) Testing MethodologyDistributed Denial of Service (DDos) Testing Methodology
Distributed Denial of Service (DDos) Testing Methodology
 
Operational CyberSecurity Final Case Report
Operational CyberSecurity Final Case ReportOperational CyberSecurity Final Case Report
Operational CyberSecurity Final Case Report
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
The Changing Security Landscape
The Changing Security LandscapeThe Changing Security Landscape
The Changing Security Landscape
 
Synopsis & toc sectoral capsule on cyber security market in india
Synopsis & toc  sectoral capsule on cyber security market in indiaSynopsis & toc  sectoral capsule on cyber security market in india
Synopsis & toc sectoral capsule on cyber security market in india
 
Lessons Learned in Automated Decision Making / How to Delay Building Skynet
Lessons Learned in Automated Decision Making / How to Delay Building SkynetLessons Learned in Automated Decision Making / How to Delay Building Skynet
Lessons Learned in Automated Decision Making / How to Delay Building Skynet
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 

Similaire à Lecture #9 : Single Sign on and Federation Identity Management

Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Sherry Jones
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Sherry Jones
 
AIIM_ASG-Automating-Information_Governan
AIIM_ASG-Automating-Information_GovernanAIIM_ASG-Automating-Information_Governan
AIIM_ASG-Automating-Information_Governan
Patrick BOURLARD
 

Similaire à Lecture #9 : Single Sign on and Federation Identity Management (20)

Indian National Summit 2010
Indian National Summit 2010Indian National Summit 2010
Indian National Summit 2010
 
What is digital identity & it's future
What is digital identity & it's futureWhat is digital identity & it's future
What is digital identity & it's future
 
Using Digital Threat Intelligence Management (DTIM) to Combat Threats
Using Digital Threat Intelligence Management (DTIM) to Combat ThreatsUsing Digital Threat Intelligence Management (DTIM) to Combat Threats
Using Digital Threat Intelligence Management (DTIM) to Combat Threats
 
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
 
Scr Tims
Scr TimsScr Tims
Scr Tims
 
AI & Machine Learning - Webinar Deck
AI & Machine Learning - Webinar DeckAI & Machine Learning - Webinar Deck
AI & Machine Learning - Webinar Deck
 
The Business Value of Shadow IT
The Business Value of Shadow ITThe Business Value of Shadow IT
The Business Value of Shadow IT
 
Top 10 GDPR solution providers 2020
Top 10 GDPR solution providers 2020Top 10 GDPR solution providers 2020
Top 10 GDPR solution providers 2020
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
Sai priya the time flies, and it has been two centuries that th
Sai priya the time flies, and it has been two centuries that thSai priya the time flies, and it has been two centuries that th
Sai priya the time flies, and it has been two centuries that th
 
Executive Summary: Considering a BYOD Infrastructure
 Executive Summary: Considering a BYOD Infrastructure Executive Summary: Considering a BYOD Infrastructure
Executive Summary: Considering a BYOD Infrastructure
 
DIDI
DIDIDIDI
DIDI
 
Newsletter dated 20th December, 2016
Newsletter dated 20th December, 2016Newsletter dated 20th December, 2016
Newsletter dated 20th December, 2016
 
Intelligent Decision Making Assistant (IDMA) for SAL improvement.pptx
Intelligent Decision Making Assistant (IDMA) for SAL improvement.pptxIntelligent Decision Making Assistant (IDMA) for SAL improvement.pptx
Intelligent Decision Making Assistant (IDMA) for SAL improvement.pptx
 
AIIM_ASG-Automating-Information_Governan
AIIM_ASG-Automating-Information_GovernanAIIM_ASG-Automating-Information_Governan
AIIM_ASG-Automating-Information_Governan
 
Dwika sharing bisnis Big Data v2a IDBigData Meetup 3rd UI Jakarta
Dwika sharing  bisnis Big Data v2a IDBigData Meetup 3rd UI JakartaDwika sharing  bisnis Big Data v2a IDBigData Meetup 3rd UI Jakarta
Dwika sharing bisnis Big Data v2a IDBigData Meetup 3rd UI Jakarta
 
Designing for privacy: 3 essential UX habits for product teams
Designing for privacy: 3 essential UX habits for product teamsDesigning for privacy: 3 essential UX habits for product teams
Designing for privacy: 3 essential UX habits for product teams
 
Reshaping IT - Reshaping Business
Reshaping IT - Reshaping BusinessReshaping IT - Reshaping Business
Reshaping IT - Reshaping Business
 
BYOD: Bring Your Own Device or Danger?
BYOD: Bring Your Own Device or Danger?BYOD: Bring Your Own Device or Danger?
BYOD: Bring Your Own Device or Danger?
 

Plus de Dr. Ramchandra Mangrulkar

Plus de Dr. Ramchandra Mangrulkar (20)

Blockchain#2.pdf
Blockchain#2.pdfBlockchain#2.pdf
Blockchain#2.pdf
 
Blockchain#1.pdf
Blockchain#1.pdfBlockchain#1.pdf
Blockchain#1.pdf
 
Blockchain#3.pdf
Blockchain#3.pdfBlockchain#3.pdf
Blockchain#3.pdf
 
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
 
Lecture #32: Forensic Duplication
Lecture #32: Forensic DuplicationLecture #32: Forensic Duplication
Lecture #32: Forensic Duplication
 
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingLecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
 
LEcture #28-#30
LEcture #28-#30LEcture #28-#30
LEcture #28-#30
 
Lecture #25 : Oauth 2.0
Lecture #25 : Oauth 2.0Lecture #25 : Oauth 2.0
Lecture #25 : Oauth 2.0
 
Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)
 
Lecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security BreachLecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security Breach
 
Lecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLSLecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLS
 
Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks
 
Lecture #7: Bell Lapdula and Biba Model of Multilevel Security
Lecture #7: Bell Lapdula and Biba Model of Multilevel SecurityLecture #7: Bell Lapdula and Biba Model of Multilevel Security
Lecture #7: Bell Lapdula and Biba Model of Multilevel Security
 
Lecture #4: Access Control Policies
Lecture #4: Access Control PoliciesLecture #4: Access Control Policies
Lecture #4: Access Control Policies
 
Lecture #3: Defense Strategies and Techniques: Part II
 Lecture #3: Defense Strategies and Techniques: Part II Lecture #3: Defense Strategies and Techniques: Part II
Lecture #3: Defense Strategies and Techniques: Part II
 
Lecture #2: Defence Strategies and Techniques (Security): Part I
Lecture #2: Defence Strategies and Techniques (Security): Part ILecture #2: Defence Strategies and Techniques (Security): Part I
Lecture #2: Defence Strategies and Techniques (Security): Part I
 
Lecture #1: Access Control : Various Cyber attacks and Latest Statistics
Lecture #1: Access Control : Various Cyber attacks and Latest StatisticsLecture #1: Access Control : Various Cyber attacks and Latest Statistics
Lecture #1: Access Control : Various Cyber attacks and Latest Statistics
 
Stream cipher: Play Fair, Hill Cipher, Product Cipher
Stream cipher: Play Fair, Hill Cipher, Product CipherStream cipher: Play Fair, Hill Cipher, Product Cipher
Stream cipher: Play Fair, Hill Cipher, Product Cipher
 
Idea
IdeaIdea
Idea
 
Sdes
SdesSdes
Sdes
 

Dernier

Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 

Dernier (20)

Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 

Lecture #9 : Single Sign on and Federation Identity Management

  • 1. djlogo.jpg Lecture #9: Single Sign on and Federation Identity Management Dr.Ramchandra Mangrulkar August 19, 2020 Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 1 / 21
  • 2. djlogo.jpg Identity Management Identity management refers to the policies, processes, and technologies that establish user identities and enforce rules about access to digital resources. People use the Internet to manage finances, access employer resources, shop, and communicate. Activity involves interacting with a service provider. Typically require that each user have a digital identity. Management of digital identity is an issue. Hence, Identity management. Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 2 / 21
  • 3. djlogo.jpg Prior to Identity Management Each service provider maintains a set of user identities Users have many identities Becomes a management burden Creates potential points of failure Privacy violations and identity theft Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 3 / 21
  • 4. djlogo.jpg Federated Identity Management A Federation is a group of providers that trust each other’s credentials. e.g. ATM card works with various bank federations such as Dena,SBI, HDFC etc. Sometimes called identity federation. User can authenticate to one domain and then access resources in the other domain without having to perform a separate login process. Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 4 / 21
  • 5. djlogo.jpg Single Sign On (SSO) Single Sign-on (SSO) occurs when a user logs in to one application and is then signed in to other applications automatically, regardless of the platform, technology, or domain the user is using. example, if you log in to a Google service such as Gmail, you are automatically authenticated to YouTube, AdSense, Google Analytics, and other Google apps. example, if you have office 365 login, then u can easily access all the office apps such as One Drive, Microsoft Power Automate, Power BI, Stream, Yammer etc. Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 5 / 21
  • 6. djlogo.jpg Single Sign On (SSO) Components Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 6 / 21
  • 7. djlogo.jpg SSO Sessions Single Sign-on and Single Logout are possible through the use of sessions. Three different sessions for a user with SSO: Local session maintained by the application Authorization Server session, if SSO is enabled Identity Provider session, if the user chose to log in through an Identity Provider Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 7 / 21
  • 8. djlogo.jpg SSO Protocolsa ahttps://auth0.com/docs/sso#saml-and-ws-federation SAML and WS-Federation Three different sessions for a user with SSO: Local session maintained by the application Authorization Server session, if SSO is enabled Identity Provider session, if the user chose to log in through an Identity Provider Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 8 / 21
  • 9. djlogo.jpg Demonstration of Single Sign On (SSO) SSO concept is used to access Two different Applications viz. Power BI and Power Automate with the help of office credientials. Microsoft office credentials (Identity Management Server) Microsoft Power BI (Application 1) Microsoft Power Automate (Application 2) Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 9 / 21
  • 10. djlogo.jpg Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 10 / 21
  • 11. djlogo.jpg Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 11 / 21
  • 12. djlogo.jpg Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 12 / 21
  • 13. djlogo.jpg Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 13 / 21
  • 14. djlogo.jpg Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 14 / 21
  • 15. djlogo.jpg Office Sign-in Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 15 / 21
  • 16. djlogo.jpg Power Automate Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 16 / 21
  • 17. djlogo.jpg Power BI Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 17 / 21
  • 18. djlogo.jpg Demonstration of Federated Identity Management (FIM) SSO and FIM together, Overleaf is accessed with the help of IEEE Credentials, Google Credentials or Twitter Credentials. Slideshare can be accessed with Linkedin and Facebook credentials. Google Credentials (Identity Management Server) Google Drive (Application 1) -SSO Google Doc (Application 2) - SSO Overleaf - FIM (IEEE, Google, Twitter) Slideshare - FIM (Linkedin, Facebook) Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 18 / 21
  • 19. djlogo.jpg Overleaf Application Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 19 / 21
  • 20. djlogo.jpg Linkedin Application Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 20 / 21
  • 21. djlogo.jpg Self Study: Microsoft Active Directory Federation Service https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/ad-fs- overview Dr.Ramchandra Mangrulkar Lecture #9: Single Sign on and Federation Identity Management August 19, 2020 21 / 21