A Review On Single Sign On Enabling Technologies A
A Review On Single Sign On Enabling Technologies A
net/publication/309225903
CITATIONS READS
16 9,523
2 authors, including:
Aqeel Khalique
Jamia Hamdard
32 PUBLICATIONS 295 CITATIONS
SEE PROFILE
All content following this page was uploaded by Aqeel Khalique on 18 July 2017.
Keywords
Single Sign On (SSO), Authentication, Multi-factor
Authentication (MFA), SAML, OpenID
1. INTRODUCTION
In the present era of Internet, Application Service Provider
(ASP) provides a standard interface to a countless number of
users and also a standard connection point to various
application providers. As almost each application has its own
authentication mechanism, users need to go through multiple
login steps. The user information and security are not
correlated making the user management complicated and
unsafe. In order to address the issues related to the user Fig 1: SSO Overview
convenience and security, the commonly used technique is
Single Sign On (SSO). SSO is an access control method Figure 1 shows the SSO approach where a user authenticates
which asks a user to login once and without any further login once and then can access different applications or services
criteria, he/she is allowed to access the resources of multiple easily. These applications can be within a single organization
software systems securely. SSO helps in the integration of the or different organizations i.e., some are within one domain
security policy and user information [1]. and some within multiple domains. Federation allows to
access applications of different organizations and hence, takes
Prior to SSO, a user was supposed to login with a new SSO to the next level where users are able to federate their
account each time a new application was opened. Hence, was SSO solution outside their organization and allow trusted third
supposed to memorize numerous passwords which is really a parties to login once and use their applications [2]. SSO
difficult task to perform. To deal with this, users usually solution copies the necessary user credentials required across
preferred to go for simple and almost same passwords. This these domains securely.
approach is easy but has a potential threat. Choosing simple
passwords made a cracker’s job easy. An attacker can guess 2.2 SSO Architecture
the password and gain access to all of the confidential There are different types of SSO architectures, with different
information. With the introduction of SSO, users are being properties and infrastructures namely Secure Client-Side
freed from this menace. They just need to authenticate Credential Caching, Secure Server-Side Credential Caching,
themselves once and then can easily access the multiple SSO with Single Set of Credentials, Public Key Infrastructure
applications running on various domains securely. based SSO, Token based SSO. Secure Client-Side Credential
The structure of this paper is outlined as follows; in Section Caching and Secure Server-Side Credential Caching come
under SSO with multiple set of credentials while Public Key
2, this paper discusses about the architecture, trust models and
Infrastructure based SSO and Token based SSO come under
variants of SSO. In Section 3, discussion about SSO enabling
technologies and protocols is done. Section 4 discusses the SSO with single set of credentials. Depending on their
benefits and drawbacks of using SSO. This paper also properties and usage, these architectures can be applied to
various situations accordingly. The detailed description of
discusses the combination of SSO with Multi Factor
these architectures is discussed below [3].
Authentication (MFA) in Section 5. In Section 6, some focus
18
International Journal of Computer Applications (0975 – 8887)
Volume 151 – No.11, October 2016
19
International Journal of Computer Applications (0975 – 8887)
Volume 151 – No.11, October 2016
possible as there is a relationship of trust between privacy needs that differentiates it with the previous
primary and secondary authentication authorities. Figure models.
5 shows that a user uses his temporary token to access
the resource without being prompted to authenticate 2.4 Different Types of SSO
himself again to the Secondary Authentication Authority. There are three main variants of SSO: Web SSO, Legacy Web
An example for this authentication strategy is the SSO, Federated SSO. We have given a brief description of
Kerberos authentication protocol. each of them below [3]:
1) Web Single Sign On: Web Single Sign On is sometimes
called as web access management. It enables a user to
provide its credentials and only after the successful
completion of authentication process, it establishes a
relationship of trust that grants a user right to access all
the resources for which he/she has been permitted.
2) Legacy Web Single Sign On: Legacy SSO is also
termed as Enterprise SSO. After a successful
authentication event, it manages multiple logins to
specific applications. Web SSO and legacy SSO are
almost identical in their structures. The difference lies in
the fact that Web SSO only manages the web based
service, while the Legacy SSO extends the SSO
functionality to the traditional legacy applications and
Fig 5: Token Based SSO network resources, typically within an enterprise’s
internal network.
2.3 Trust Models of SSO
Different trust models need to be defined in order to evaluate 3) Federated Single Sign On: Federated SSO has a much
various SSO solutions. These models vary depending on the broader concept than Web SSO. It uses Simple Object
scenario of business in which they are implemented. The Access Protocol (SOAP) and Security Assertion Markup
model generally defines the various entities and their Language (SAML) to enable users to sign on once into a
interaction and the overall system characteristics. Based on member of affiliated group of organizations and
the services that the SSO environment support, three models henceforth, access all the websites within that trusted
have been defined. These are [4]: federation. It extends the functionality of SSO from
user’s home domain to another foreign domain. This
1) Authentication and Authorization Model (AAM): function of Federated SSO is its main advantage.
AAM describes all the necessary frameworks that Enterprises using federated SSO are allowed to maintain
provide the basic two features that are authentication and the control of their local services and the exposure of
authorization. The model being a traditional trust model these resources to a larger class of users without the
represents the basic mechanism in which there is a enterprise’s direct administration.
service that checks all the users’ credentials to decide
whether an access should be granted or not to a user that 3. SINGLE SIGN ON ENABLING
is requesting an access. Here two major entities are
involved: users that are requesting access to resources
TECHNOLOGIES AND PROTOCOLS
and services that share these resources. AAM model thus There are multiple protocols that can be used for SSO
is based on a classic client-server architecture providing implementation like Kerberos, Security Assertion Markup
a generic protocol of authentication and authorization. Language (SAML) etc. Few of them are listed below [5]:
2) Federated Model (FM): It is one of the emergent trust 1) Kerberos: The Internet Engineering Task Force (IETF)
model wherein several homogenous entities interact to has defined the Kerberos protocol as an open standard
provide the required services. Again here two major that is used on many platforms. The protocol makes use
entities are identified: users that request access to of Key Distribution Centre (KDC) as the server. It
resources and the services that share these resources. The provides strong token based authentication using secret
major difference between AAM and FM model lies in key cryptography for client/server applications. KDC
the definition and composition of services. In the latter authenticates the users to other servers for a particular
one, the services do not reside on the same domain. session. The primary and secondary authentication
Hence are distributed on different domains that are built domains share a trust relationship that is based on
on the same level, thus allowing mutual trust and cryptographic methods and is used to validate the user
functionalities like cross-authentication are also being token. The transportation of authentication tickets is done
provided. using Remote Procedure Calls(RPC). Kerberos is a good
3) Full Identity Management Model (FIMM): This choice for organizations that wish to authenticate users
model is one the most challenging trust model and could using SSO to multiple applications across different
merge the above two models. The model in addition technologies but the system applications should support
provides mechanisms of identity and account Kerberos for this work.
management and privacy protection. Here three major 2) Lightweight Directory Access Protocol (LDAP): The
entities are involved: users which request access to servers that centralize information about an organization
resources, services that share these resources and identity such as employee names, employee address, telephone
manager, which manages the user identities by providing numbers and credentials are called directory servers and
the necessary functionalities. The model tries to fulfil the LDAP is used to query these servers. Active Directory a
20
International Journal of Computer Applications (0975 – 8887)
Volume 151 – No.11, October 2016
Microsoft’s version of LDAP enables true SSO using involved in SAML are the user, the Identity Provider
Kerberos but for Window’s environment only. For (IdP) and the Service Provider (SP) as shown below. The
application authentication, central LDAP is more IdP makes ‘assertions’ about the user’s identity and
practical than building authentication into each attributes to the SPs. Service provider (SP) provides a
application. specific service or hosts a target application.
3) RADIUS Protocol: The acronym stands for Remote
Authentication Dial-In User Service. The protocol is
used for authentication of remote users for example users
that connect via Virtual Private Network (VPN). The
protocol is a connectionless client/server protocol based
on User Datagram Protocol (UDP). RADIUS server
which is usually a daemon running on UNIX or windows
machine when provided with the user credentials, can
support various authentication mechanisms such as PAP,
PPP or Unix login.
4) Agent Scripts: When security policies are revised or
passwords are changed, scripts that run on a central
authentication authority can be used to synchronize a
user’s password across systems. This can be done via
Extensible Markup Language (XML) scripts and
Structured Query Language(SQL) can be used for
encryption to manipulate the data in databases.
5) Cookies: The pieces of software that are downloaded
Fig 6: Protocol Flow of SAML
onto the client machine are called cookies. Cookies are
token based SSO technology for HTTP environment that Figure 6 shows the flow of SAML. The three main
are used to authenticate sessions for certain time periods. entities are: user, Service provider and the Identity
The user will have to re-authenticate itself after the provider. The steps involved in the working of SAML
cookie expires. are shown in Figure 6 where a user first requests Service
provider like GOOGLE to access its application. The
6) Digital Certificates and Public Key Infrastructure
Service Provider can make a proper access control
(PKI): A system used for storing and maintaining
decision i.e., whether to perform a requested service for
encryption keys is referred to as a Public Key
the particular user or not based on the assertion which is
Infrastructure (PKI). This approach makes use of the
being provided by the Identity provider on request of the
public key cryptography for user authentication. The
concerned Service Provider [6].
system relies on the role of Certification Authority (CA)
for the issuance and management of the digital 2) OpenID: OpenID is an open and promising user-centric
certificates and hence users’ digital identities. The user Web SSO solution. A web SSO solution has separated
first has to identify herself/himself to an authentication the role of Identity provider (IDP) from that of Relying
authority which issues a public key certificate to the party (RP). An IdP collects user identity information and
authenticated user. Whenever the authenticated user authenticates users, while for further authorization
wants to access a protected resource in subsequent decisions, RP relies on the authenticated identity. In
authentication request, he/she creates a token and OpenID, the existence of trust relationship between IdP
includes its digital certificate (public key) in it and signs and RP is not required and users are free to choose or
it with her/his private key. On the reception of the setup their own OpenID providers [7].
request, the target server contacts the CA in order to
verify the identity of the requesting user. There is a Figure 7 shows the protocol flow of OpenID. Its flow
relationship of trust between the primary CA and the may vary with different implementations. Here, the user
secondary CA as the latter’s certificate is being issued by selects it’s IdP or enters his/her own OpenID via a login
the former one. This enables any secondary CA to accept form presented by a RP. The RP discovers IdP (OpenID
the certificate issued by the primary CA. provider) endpoint and redirects his/her OpenID to the
IdP for authentication of the user. The user enters his/her
7) Web Security Service: It supports cross domain and username and password and hence authenticates itself to
cross platform communication among different business the IdP and then consents the IdP to the release of his/her
entities. profile. The IdP verifies the user’s credentials and if
valid, redirects the OpenID and profile signed by it to the
According to our study, the protocols used in web SSO are:
RP. Ultimately, the user gets an access to the application
1) Security Assertion Markup Language (SAML): he/she wished to access [7].
Security Assertion Markup Language (SAML) is a
XML-based protocol developed by Organization for the
Advancement of Structured Information Standards
(OASIS). It is basically a platform independent, non-pro
proprietary protocol that is used for communicating user
identities between parties- who usually conduct business
with each other. SAML is a key aspect of Federated
SSO. It allows the communication between domains
having different authentication mechanisms. The entities
21
International Journal of Computer Applications (0975 – 8887)
Volume 151 – No.11, October 2016
22
International Journal of Computer Applications (0975 – 8887)
Volume 151 – No.11, October 2016
5) Linking of accounts: The users mostly are not familiar 5. COMBINATION OF (SSO) WITH
with the account linking process and when asked by a
website to login by their existing social networking MULTI FACTOR
accounts, they get confused and frustrated and eventually AUTHENTICATION (MFA)
drop the plan of SSO. The process of proving your identity and verifying that you
are the same entity as you claim to be is referred as
If the above factors are properly addressed, then the SSO authentication. There are a variety of mechanisms available
technology may gain momentum in the lives of the socially for authentication, these are: Biometrics, One Time
active users. They may switch to the concept of “All the eggs Passwords, Digital Signatures etc. The authentication is called
in one basket”. Among all, the trust factor is the most as Multi-Factor Authentication (MFA) if at least two of the
significant one as the trust and privacy share inverse three authentication mechanisms listed below are satisfied at a
relationship i.e., as the trust increases, privacy decreases particular instance of time by a user [5]. These mechanisms
automatically. The websites following SSO mechanism are:
should have proper design interfaces with least errors. If the
users perceive a website to be honest, competent and 1) Something you know (a password or a PIN)
convenient in delivering its services they would trust it and
hence will easily accept the websites’ terms and conditions 2) Something you have (say a smart card or a mobile
and will provide the correct and accurate information [7]. phone)
For all the information and resources kept in the system like 3) Something you are (as represented by, say, a fingerprint)
personal detail information, users’ profiles, addresses, cost An ATM based transaction is an example of Multi Factor
documents, certificates and policies related to the company, Authentication as here two of the above three conditions need
privacy has a role to play. These important documents must to be satisfied for a successful transaction. The ATM card
be stored securely so that the information will never get holder must have his/her ATM for a transaction satisfying the
compromised. SSO identities carry the personal information type “Something you have” and besides this, he/she must have
of the user. Due to this reason, privacy is more important in the pin code of the same which satisfies the another condition
the open SSO environments than the closed one. Several “Something you know”. Multi Factor Authentication if used
organizations are thus looking for SSO identities that do not in collaboration with SSO can help to reduce the security
carry personal details and support unlink ability feature for issues related to SSO and hence, making it more secure [5].
those identities which they are transporting inside the
network. The proxy servers should be used to carry traffic
between the users and the SP (Service Provider) in order to
ensure that the user’s real network address is replaced by the
proxy one [7].
2) Password Fatigue: 50% of the users dislike the idea of Figure 8 shows the combination of SSO with MFA where a
creating new password combination. Moreover, often the user first signs in via Single Sign On approach (PKI
users already have to remember at least 5-6 passwords encryption) and has to get through second authentication step
besides this new one. Almost 40% use the forgot using MFA like One Time Password (OTP) before getting
password feature every month. Even some people even access to the resource. OTP can be delivered to the user via
have a thought like solving the world’s peace problem is SMS, phone call or using some mobile application. The time
even easier than remembering so many passwords. limit of the OTP is fixed after which the session expires
making the code invalid.
3) Trust: Trust is a problem. 88% of the users have
admitted that they have lied on a registration form but 5.1 Advantages of Using SSO with MFA
60% would give more information, if they knew how it Following are the benefits of combining SSO with MFA [5]:
would be used.
1) Enhanced user productivity and user satisfaction: The
Though password manager feature shoulder the password SSO approach increased user productivity and
fatigue burden but they can’t resolve the registration satisfaction as users need to spend less amount of time on
challenge. Then the choice users are left with is “Social logging into systems.
Login”, introduced in 2008. Almost 77% prefer social logins.
2) Reduced IT costs: SSO reduced the no. of password
Social logins occur when users use their existing IDs from a
reset calls to the IT help desk up to 95% as now the users
social network or email provider. Facebook is the most
need not to memorize multiple passwords, it’s just one
popular one. 54% are using Facebook social login. For the
password and 90% of the users’ work is done.
first time since Janrain has been reporting, Facebook has
Furthermore, the installation, maintenance of separate
exceeded 50% of the aggregate total of all social logins. Thus,
authentication systems also is reduced as SSO provides
the burden of registration is overcome by the concept of social
central management of users. There is further reduction
logins. Most people like to return to a website if they get
in IT costs and improvement in efficiency as the cost of
automatic recognition through social network [10].
23
International Journal of Computer Applications (0975 – 8887)
Volume 151 – No.11, October 2016
MFA systems like fingerprint scanners is decreasing but has three different accounts, he would prefer to set easy and
not at the cost of reliability. almost same password to access each of its account say “his
birthdate” or “his best friend’s name” and so on.
3) Improved Corporate data security: The risk of a
hacker getting “key to the castle” which was a major SSO systems can centralize authentication on special servers
breakthrough in SSO is reduced by the coupled usage of as they are often based on complex systems management
SSO with MFA and also this implementation gives more applications. Thus can make a positive contribution to an
assurance of a user’s true identity- sometimes required information security program of an enterprise. This can be
for systems or transactions of higher risk to an done by using dedicated servers that hold SSO modules.
organization. The attacks like phishing and malicious These servers act as gate keepers, thus making sure that all the
code attacks also can be prevented as though the traffic trespasses through the SSO server first, which then
password can get compromised somehow but the passes along the credential it has stored for authenticating the
additional authentication factors like biometrics or tokens particular application registered with the SSO system. To
cannot be obtained easily. prevent malicious access, this centralization requires more
planning, tuning and auditing than single authentication
4) Enhanced business customer base: The prime systems. The secure storage of authentication credentials and
requirement of an account creation with a password often encryption keys in SSO systems make the hackers job even
impede users from registering on retailer websites which more challenging. Keeping track of users, pruning out inactive
can badly affect the business of owners. SSO via its accounts of long-gone employees and monitoring suspicious
technology of OpenID, allows users to register even activity are all part of SSO and can increase an organization's
without a password. Hence, encouraging more registrants IT security [12].
and business.
Also by using the SSO in collaboration with MFA can help to
5.2 Challenges in SSO/MFA reduce the risk of loss of “Single key to the castle” as for now
Implementation even if the master key gets compromised somehow, still the
Some of the challenges associated with SSO/MFA hacker can’t get access to the sensitive information of the user
implementation are [5]: without crossing the second step of authentication [5].
1) Although MFA minimizes security problems related to Hence SSO approach altogether helps the users to easily
access control but still there are some security issues like access and manage different applications and services
the OTP tokens that can be compromised by man-in-the- securely. Although there are some risks involved but if the
middle phishing attack, smartcards can be hacked or user manages to keep the key secret, then SSO may be of
stolen, the Trojan horses can be used by attackers to great benefits.
piggyback the user sessions after they have logged in.
Though MFA can be cracked yet it does enhance the 6.2 Is SSO a Risk Factor?
security of corporate networks rather that of Internet as SSO helps to avoid the loop of authentication but at the cost
the attackers keep on changing their tactics. of some drawbacks. The users may be unable to authenticate
themselves if the SSO provider goes down, thereby bringing
2) The success of SSO and MFA implementation relies on the whole system’s working to halt. This failure is called as
user acceptance. The users may resist to carry tokens single point of failure. Also, it is quite possible for a SSO
with them or get fingerprinted. Tokens can easily get server to get hacked or breached, which may lead to data loss.
misplaced by users or stolen by attackers. Thus, user Furthermore, all of the crucial and confidential data of a user
acceptance is a key challenge to SSO/MFA may get compromised in just a single shot, as all of the
implementation. authentication credentials are in the same basket and the key
to the basket may get revealed if the coupled usage of SSO
3) Depending on the size of an organization and the type of
and MFA is not implemented. Thus, it cannot be considered a
SSO/MFA technology used, system costs can be
total security tool. Sharing of user data with a third party is
extremely high. Some systems like client software may
another underlying factor which enhances the risk factor of
not support MFA devices and hence, new compatible
SSO usage. In order to cover a good portion of potential users,
devices (hardware and software) need to be purchased,
the right choice of Identity provider is vital. Hence, the
configured and installed. Hence, a proper cost analysis
disadvantages of relying on a third party is overwhelming and
can correctly determine the worth of SSO and MFA.
needs to be addressed to minimise the risk factor involved in
6. ANALYSIS SSO [12].
6.1 Is SSO a Security Practice? 7. CONCLUSION
The concept of Single Sign On has gained momentum in SSO is an access control method that allows a user to access
recent years with the increasing popularity of social multiple domains on a single step of authentication. Thus,
networking. One login type applications provide access to relieves the user from the hassle of remembering numerous
tons of accounts across the panel, particularly in social media passwords for multiple applications. SSO is used for user
[6]. Most of the users prefer to use SSO approach because it is convenience. However, if the main key of the authentication
convenient for them as it allows them to access scores of is breached, then the user’s crucial details may get
individual accounts just by remembering a single password compromised. As discussed, this threat of losing master key
and henceforth saving them from the hassle of setting unique can be reduced by using SSO with MFA. The combination of
set of username and password to each of their accounts. SSO and MFA may allow a user to not worry about the
Besides these benefits, SSO has some negative impact too but negative consequences of losing his/her master key. Due to
still the risks of SSO users are less than those of non-SSO second step authentication, an intruder cannot access a user’s
users as the latter tend to keep almost same password to confidential data by acquiring just a key. However, MFA also
access their internal and external applications and mostly store has a bottleneck. It can get compromised by phishing or man-
their passwords in unsafe areas [11]. For example, if a person
24
International Journal of Computer Applications (0975 – 8887)
Volume 151 – No.11, October 2016
in-the-middle attacks. For example, a fraudster somehow may Organizations – A Critical Evaluation Using TOE
steal a legitimate user’s OTP which is possible by installation Framework. J. Issues in Informing Science and
of malicious software on the target’s device and hence, Information Technology, (May 2010), 172-184.
bypassing the traffic meant for it. However, these threats can
be addressed by several ways like disabling key logging and [6] [Online]https://wiki.eclipse.org/images/e/ec/Saml2idp-
screen capturing of OTP, securing authentication and 1.png
communication against malware attacks etc. Thus, the [7] Sun, S. T., Pospisil, E., Muslukhov, I., Dindar, N.,
benefits of using SSO are worth mentioning and if its Hawkey, K., and Beznosov, K. What Makes Users
disadvantages are properly addressed and tackled, it will be Refuse Web Single Sign-On? An Empirical Investigation
user convenient and will help them to access applications with of OpenID. J. Symposium on Usable Privacy and
ease and security. As a part of future work, we would like to Security (SOUPS), (Jul. 2011), 1-3.
focus on implementing security mechanisms in combination
of SSO and MFA. [8] "The Advantages and Disadvantages of Single-Sign-On
(SSO) Technology", Secure Connexion, 2012. [Online]
8. REFERENCES https://secureconnexion.wordpress.com/2012/08/24/the-
[1] Li, B., Ge, S., Wo, T. Y. and Ma, D.F. 2004. Research advantages-and-disadvantages-of-single-sign-on-sso-
and Implementation of Single Sign-On Mechanism for technology-mini-whitepaper/.
ASP Pattern. In Proceedings of the Third International
[9] Villanueva, J. 2014 "5 Big Business Benefits of Using
Conference on Grid and Cooperative Computing.
SSO (Single Sign-On)" Managed File Transfer and
[2] [Online]http://blogs.vmware.com/vfabric/files/2013/03/a Network Solutions.
uthentication_chart.png
[10] [Online]
[3] Patil, A., Prof. Pandit, R., and Prof. Patel, S. 2013.
http://janrain.com/wp-content/uploads/2012/10/how-to-
Analysis of Single Sign on for Multiple Web
solve-the-online-registration-challenge.png
Applications. J. Advanced Research in Electrical,
Electronics and Instrumentation Engineering, (Aug. [11] "Does single sign-on (SSO) improve
2013), 4104-4107. security?” SearchSecurity, 2016. [Online]
[4] Ardagna, C. A., Damiani, E., Vimercati, S. C., Frati, http://searchsecurity.techtarget.com/answer/Does-single-
F.and Samarati, P. 2006. CAS++: an Open Source Single sign-on-SSO-improve-security.
Sign-On Solution for Secure e-Services. In Proceedings [12] Davis, M. 2013 "The Pros And Cons Of Single Sign-On
of the 21st International Information Security Conference for Web Services", Future Hosting, [Online]
on Security and Privacy in Dynamic Environments. https://www.futurehosting.com/blog/the-pros-and-cons-
[5] Alphonso, M. D., and Lane, M. 2010. The Adoption of of-single-sign-on-for-web-services/.
Single Sign-On and Multifactor Authentication in
IJCATM : www.ijcaonline.org 25