1 / 6

Single sign-on

Single sign-on. Mike Ladd Nazia Raoof Bret Walker Kumar Mukherjee Rajesh Radhakrishnan. Background. User wants to log in once Access multiple applications or third party sites Log in with his or her credentials/profile Business case: corporation has 15,000 retail stores

sissy
Download Presentation

Single sign-on

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Single sign-on Mike Ladd Nazia Raoof Bret Walker Kumar MukherjeeRajesh Radhakrishnan

  2. Background • User wants to log in once • Access multiple applications or third party sites • Log in with his or her credentials/profile • Business case: • corporation has 15,000 retail stores • loose more than $1,000,000 per year • due to high labor costs • associated with multiple authentication, unnecessary user clicks, forgotten passwords, firewall issues

  3. Challenges • Write your own SSO server? • Myriads of interfaces to write • Buy? • Limited options • Proprietary implementations • Legacy applications, Email Solutions, Content Management solutions, Mainframe/Unix/Windows, owned solutions • Availability of connectors • JOSSO/SAML emerging but in infancy • Open to whole world scenario if not carefully planned • Build or Buy decisions • Integration issues • Still in infancy & little or no standards • High availability and Enterprise wide issues • Service offerings vs. appropriate users • Licensing issues

  4. Industries • SSO technology is applicable to any industry involved in using multiple applications and multiple computers systems with authentication requirements: • Users have enough to worry about in their pressure-packed jobs without having to remember multiple passwords for multiple applications and multiple PC terminals that they may have to use at work. • Cost are associated with users calling help desk for password resets • Password inflation and security weaknesses raised by multiple logons. • SSO access management infrastructure to control user access to its tools for product development, procurement and supply chain management, etc • SSO allows users access to only applications and resources they have been authorized to access. • Agriculture • Automotive • Transportation • Construction • Education • Financial Services • Government • Healthcare • Real Estate

  5. Questions? • Road Runners will discuss a solution for this issue on June 7, 2008. Don’t miss it!

More Related