Single Sign-On: The One Password Revolution

1597 Words4 Pages

In this world, we know that time waits for no one. This is especially true in today's action packed, fast-paced world. For many of us, we are an hour or two behind schedule before we even wake up. We grab the first thing we can to eat and a cup of coffee, and out the door, we fly. We arrive at work five minutes late and sneak in so as not to alert the boss to our tardiness. We access our computer to long in and there is a user name and password required. After the information is provided, we go to the page that we will be using, only to find that there is another user name and password waiting to slow us down. Now if you are fortunate enough, and your company has a Single Sign-On application running, then maybe you are in like flint, but if your company does not use this technology, you are looking at new user names and passwords to access your work. What is Single Sign-On, well, that is what we are going to examine.

SSO 4

Single Sign-On, the One Password Revolution

It is 6:00 in the morning, when Bob awoke to the sound of his alarm clock. He springs from his bed and leaps into the shower. Bob worries that his first day at the office may not go the way he hopes. You see, Bob graduated in the summer of 1989 with a Business degree, and is anxious to put all that knowledge he has absorbed into work. He finishes his shower, gets dressed, fills his coffee mug, and out the door he goes. He does not mind driving his yellow 1972 Ford Pinto to work because he knows that he will be able to trade up in the not so distant future if everything goes well with this new job. Of course, he has to remind himself that he only has an entry-level position, but that is ok, he has big plans for the fut...

... middle of paper ...

... make moving from application to application easier however it still has disadvantages. They can be complex, time-consuming, and expensive to retrofit to existing applications. There is an increased risk in security. It is possible that an unauthorized user could gain access to an application if the user steps away from his or her station, or if the unauthorized user should happen to find an authorized user's username and password. This leaves the applications open to malicious users who are bent on damaging a system or compromising applications. Hackers who gain access to a user's authentication criteria have a better opportunity to compromise a system. Therefore, it is essential that both users and administrators protect against the possibility of a compromised user's authentication criteria. The diagram below represents a No SSO environment.

SSO 9

More about Single Sign-On: The One Password Revolution

Open Document