information-rights-management

What is Single Sign-On

March 2, 2010

With Single Sign-On a user needs only one user ID and password this eliminates the security headaches and vulnerabilities associated with multiple IDs / passwords. This solution simplifies and frees security administrators from the mundane task of assigning passwords, enabling them to perform much more important tasks that directly impact the success of your.

Single Sign-On considerations:

 Easy and simplicity to deploy and maintain

 Deliver maximum flexibility by working across all platforms, databases, and applications

 Out-of-the-box support for all relevant third-party technologies – such as Authentication, PKI, and smart cards — as well as open APIs for complete extensibility.

 Scalability from small focused user departments to large-scale global eBusiness enterprises.

 Easy to deploy and maintain, Can be implemented incrementally, delivering a quick return on investment.

What problem does it solve (technically)?

 Multiple login/user ID and password confusion

 Insecurity from having too many user IDS and passwords

 Administrative burden of password resets

 Unproductive user access

 Unrestricted network access

 

Business reasons for the technology

 Increase user productivity by providing manageable access to applications

 Increases security as users do not write passwords down

 Reduce Help Desk administration overload

 Provides only those applications/resources that the user/customer is authorized to access

 Can integrate with user administration product

 Works across all platforms including client/server and Web-based

 Open API authentication toolkit protects long-term investment

 Scalable to accommodate small user groups to large-scale global enterprises

 Easy to deploy and maintain

 

Single Sign-on Solution Design Considerations

The purpose of this section is to design and plan the Single Sign-On (SSO) implementation within the Client enterprise. During this Phase, the following goals will be accomplished:

Identify key solution and staffing components:

a. Resources

 Key roles:

o SSO Administrators

o SSO script writer(s)

o SSO Password Manager

o SSO Auditor(s)

o DB Manager (backup and maintenance)

 Define number of people to be trained

 Define person in charge for all technical issues that may occur during the implementation

b. Identify Hardware/software used in the organization

c. Define Applications for which SSO will automate the login process throughout the implementation phases

 Review how users currently launch these applications

 Document versions and platforms for these applications

d. Identify SSO Users:

 Groups where SSO can be piloted

e. Identify Server and Workstation availability:

 

Design Single Sign-On Architecture:

a. Review the client infrastructure from the SSO perspective

b. Document the system configuration/environment/OS, especially of the workstations:

 

Network configuration and design, Windows NT trust domains and other entitlements

c. Plan the number, type, and location of the different SSO components, based on the following criteria:

o Customer needs

o Network issues

o Geographic locations

o Hardware and software availability

o Crucial and central points

 

Design login / fail-over approach

a.Define the Hot Backup, loading balancing, and replication relationships that will be implemented

b.Develop an overall installation (rollout) plan, with schedules, resources required, etc.

c. Develop detailed, step-by-step procedures for installing the hardware and software, particularly on the client, paying particular attention to configuration issues.

d. Determine script/application approach and scope

e. Determine password change methods

f. Determine security policies

g. Develop a test plan