Advantages And Disadvantages Of SSO

Improved Essays
Introduction Nowadays it seems like you can’t even access half of the websites you would like to with using some sort of authentication. To help solve this issue a large number of websites have created login systems that are centralized. The centralized systems supply users with an electronic identity of sorts which is better known as a federated identity. This paper will discuss some problems that can arise when not having SSO in place, some advantages and disadvantages when using SSO for AD and LADP access and a comparison between Kerberos-based and smart card based SSO.
Problems in organizations without SSO implemented When organizations do not have SSO implemented, it can cause some issue for system users. Reports have shown that an
…show more content…
It the user gets locked out of their AD account, they will be losing access to all of the other systems that are associated to their account.
2. If a user’s AD credentials are compromised, the attacker may be able to access to all of the other protected resources that those credentials are associated with.
3. If network connectivity is lost to the domain controller that holds the AD credentials, the users will be unable to gain access to all of the systems that are attached to AD.
Advantages and disadvantages using LDAP for SSO Using LDAP for single sign on can also make it very easy for system users to access multiple systems with one set of credentials. There are as many advantages as there are disadvantages when using LDAP for single sign on. The following are some of those advantages and disadvantages:
Advantages of using LDAP for SSO
1. Since LDAP is pretty much standardized, there are many plugins that are readily available.
2. The passwords are stored securely with all of the needed authentication methods as well as the security mechanisms are already implemented.
3. You can implement its account lockout policies and it password history features if
…show more content…
Both Kerberos and Smartcard-based SSO have some established standards. Smart-cards fall under the International Organization for Standardization (ISO 7816) which has several parts included in it from physical characteristics to interindustry data elements. Smart-cards are also gaining popularity in Debit and Credit cards. Kerberos is based on RFC 1510 and is more of an industry standard and is included in Microsoft OS’s.
4. As it relates to implementation, Kerberos-based SSO implementation does have some challenges. The Kerberos security server has been online 24/7 so that its able to generate new security tokens as requested, which can be quite a challenge. Smart-card based SSO implementation can also be challenging. You must have a public key infrastructure setup before you implement the smart-card based SSO. Finding a cost effective smart-card can also be very challenging since plug-and-play readers are not supported.
Conclusion
SSO makes it much easier for users and system administrator alike. There are many different SSO protocols like, Kerberos, LDAP and Smart-cards. Most companies integrate SSO and AD so that users only need to remember one set of credentials. SSO seems to be a technology that is here to stay. The new implementations are such as smart-card chip in debit and credit cards to social media and other such sites using it a means of logging

Related Documents

  • Improved Essays

    5. Physical Security Devices a) Employee Identification Badges / Smart Cards: The company should provide employees with picture identification badges with a smart chip and magnetic strip. The company will provide unique public-key infrastructure (PKI) certificates on the employee’s smart chip, which will allow user access to the company network. Radio Frequency Identification (RFID) capable cards should not be used. While they are more convenient for access control than swipe cards, an attacker can scan and capture the identification information provided by the RFID chip without having to have any physical contact with the ID card, and use that information to gain access [43].…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 1 Assignment 1

    • 1566 Words
    • 7 Pages

    C. Services & Applications 1. TRUSTED a) Microsoft Active Directory (AD) Domain: In order to resolve the issues inherent in a peer-to-peer network, a centralized means of user authentication and resource sharing must be implemented. Microsoft Active Directory (AD) is a centrally administered, hierarchical structure designed to manage user access to shared network resources in a domain. Windows Server 2012 R2 Datacenter edition operating system (OS) is required to establish and manage the company’s AD domain.…

    • 1566 Words
    • 7 Pages
    Great Essays
  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Superior Essays

    Introduction The current information technology (IT) infrastructure consists of a mix of 2008 and 2008 R2 servers, with two legacy Windows 2000 servers, and four Windows Server 2012. In addition to the Windows server environment, the network consists of routers, switches, and security appliances, such as firewalls. The environment also consists of important services to ensure the security, and stability of the network.…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3

    • 483 Words
    • 2 Pages

    Microsoft was the one to develop Active Directory. Directory services are provided by Active Directory to windows domain network. It stores all the information related to files, users, resources and computers. It places them in proper hierarchal logical groupings. It uses this information to provide the right access and authority to the right user.…

    • 483 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 3 Assignment 1

    • 1044 Words
    • 5 Pages

    Along with usernames and passwords to computers is by adding usernames and passwords for individuals that need to gain access to certain files on servers. Network administrators have the task of providing each user with only the data that they need access to. If all users have access to everything on the network this serves as a security threat because if one user's credentials are compromised the whole system can become jeopardized by unauthorized…

    • 1044 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Western Governors University A. Security Faults Describe three of the security faults in this scenario that caused a security breach. 1. Some accounts existed before the electronic health record(EHR) was deployed. Important steps were missed during the import of old accounts. I suggest using a clean base line for the brand new EHR system.…

    • 588 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    User connectivity will be controlled and authenticated through active directory. User devices will require and object to be created in active directory which will be used to authenticate the device using 802.1x. When a user device is connected to the network it will initially communicate on a VLAN will only be allowed to communicate with active directory. Then once the device has been authenticated it will place the device on the appropriate VLAN that it will operate on. Any device that has not been set up in Active Directory will be placed into a null VLAN which will not grant access to the network.…

    • 707 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3 Term Paper

    • 621 Words
    • 3 Pages

    3. Use a Password Management Tool Phishing are made specially to gain usernames and passwords to steal sensitive or confidential information. The passwords management tool can be used to ease the staffs by changing their passwords after each important transactions and send messages for confirmation and their new and unique passwords. 4.…

    • 621 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 3 Lab 1

    • 1712 Words
    • 7 Pages

    1. Goal Following the introduction of Windows-based systems into our virtual environment in Lab 3, this final individual lab takes the base Microsoft administrative technologies put in place such as Active Directory, and pushes them forward with more advanced systems administration features. The major new additions to the infrastructure are Group Policy and fine-grained password policies where users, computers, and groups are given a more personalized as well as secure computing experience based on the role and importance those objects play in the overall infrastructure. I found the information as well as skills learned in this lab invaluable due to how important Group Policy is to Active Directory and how end systems as well as users are…

    • 1712 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    • Authentication- this domain controller is made only for routine security processes. Due to this, it can perform these processes much faster than another server that is busy running programs and processing resources. Using a domain controller makes it easier for a user to access the domain and network, and the time savings are often rather large if this is used across a big network. Resource Authentication.…

    • 484 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Core Credit Union Case

    • 1381 Words
    • 6 Pages

    Advantages Cost Efficient For non-profit organisation Core , third party services are cost efficient because putting the services in another hand saves the cost of infrastructure and manpower to carry out the operations. Even the maintenance cost is lowered.…

    • 1381 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Team 3: Vadde Aditya, Bishal Bk, Fang Fang, Suraj Karki, Varshini Paladugu, Raghuveerreddy Suram Week 7 Group Assignment • Discuss what can happen if the framework you choose as a foundation does not fit your organization’s business objectives. If the framework the organization choose as a foundation does not fit the business objectives, it may face several problems as following. 1.…

    • 723 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Digital Identity Essay

    • 1398 Words
    • 6 Pages

    A personal identity is something that defines a person and is developed throughout the course of their life. It is made up of the essential and unique characteristics which defines you and includes both aspects of your life which you have control over such as what your interests are and what you do during your spare time, as well as factors which you have no control over for example your physical characteristics and where you grew up. Digital Identity is the technological equivalent of Personal Identity, It is used to distinguish individuals for the purpose of connections or transactions. A Digital Identity is comprised of characteristics such as; Username and Password, Date of Birth, ID Number, Purchasing history etc. It is linked to one or…

    • 1398 Words
    • 6 Pages
    Great Essays