Apa itu SSO (Single Sign On)?

What is SSO (Single Sign On)?

SSO is a mechanism that makes users only need to remember one authentic user name and password to open several services at once. SSO (Single Sign On) needs to be authenticated once, then authentication will occur automatically when the user opens another website through a session. (Priyo Puji Nugroho, 2012)

Configuration

       In its development, there are several types of configurations that can be used, including:

  1.  SAML

            This SSO protocol is included as an open standard. It provides assertion-based authentication and authorization in XML form. This standard is most widely used by software-as-a-service applications, such as Salesforce, Github, Jira, ServiceNow, and Workday.

       2.  OpenID

            OpenID was introduced by the Open ID Foundation in 2006. Then in February 2014 they again introduced the third generation of Open ID called Open ID Connect (OIDC). This standard has been used by more than a billion accounts, the most famous of which are Google and Facebook.

       3.  Kerberos

            Kerberos is an authentication protocol developed by the Massachusetts Institute of Technology (MIT). Introduced in the 1980s, it was developed as a user authentication solution in a large and distributed network. He uses a secret thesis key with a complicated algorithm.

Sumber: https://www.softwareseni.co.id/blog/manfaat-sistem-login-single-sign-on

excesss

  • Users don't need to remember many passwords, just one account for multiple applications,
  • Speed up the login process, as there is no need to re-enter passwords for different applications while the login session is still active,
  • Makes administrative work easier, creating user accounts is enough once for some applications,
  • Centralized administration, the process of changing and updating users is easier because it is in one place.

deficiency

  • If the SSO system is down, then all applications that use SSO cannot be used,
  • If the authentication information is leaked, it can be used in all related applications.

Thus the information that can be us Give, if information like this is useful, don't forget to continue to follow us because there will be many more interesting information about the world of technology.

Berita Rekomendasi

Top Vulnerability Assesment Scanners Tools

12/11/2024

Top Vulnerability Assesment Scanners Tools

A. Vulnerability Scanners Vulnerability scanners are scanners that can automate security audits and can play an important role in the security of users' IT by scanning users' networks and websites...

View
Tools Analisis Data Optimalkan Keputusan Bisnis Anda

24/12/2024

Data Analytics Tools Optimize Your Business Decisions

Choosing the right Business Intelligence tool or data analysis tool can increase efficiency in analyzing data and generate valuable knowledge. In this discussion, we will provide a list of tools that...

View
Apache Flink untuk pemprosesan Data Real-Time

02/07/2025

Apache Flink untuk pemprosesan Data Real-Time

Optimalkan Bisnis dengan Pemrosesan Data Real-Time Menggunakan Apache Flink Di era data yang bergerak cepat, bisnis tidak hanya dituntut untuk mengumpulkan data, tetapi juga memproses dan memanfaatkannya secara real-time. Setiap…

View