SlideShare a Scribd company logo
1 of 14
Single Sign-On Assistant: 
An Authentication Broker 
for Web Applications
TARGETJ SOLUTIONS 
• REAL TIME PROJECTS 
• IEEE BASED PROJECTS 
• EMBEDDED SYSTEMS 
• PAPER PUBLICATIONS 
• MATLAB PROJECTS 
• targetjsolutions@gmail.com 
• (0)9611582234, (0)9945657526
Aim 
Single sign-on assistant for web based applications, called SSOA, 
aiming at ‘logging in once, running everywhere’, with which we would solve 
uniform identity authentication among heterogeneous systems attaining 
simplicity, scalability and relatively low cost.
Synopsis 
 Web-based systems are now widely used in many fields. Users are 
usually required to conduct identity authentication separately when logging in 
different systems before getting service. 
 For the sake of security, it is improper to use a global identifier and 
password among several systems. 
 Many approaches are proposed to solve the problem, among which 
single sign-on (SSO) is most popular schema with which a user logs in once 
and gains access to all systems without having to log in again. We put up a 
single sign-on assistant, called SSOA, for web-based applications.
Synopsis 
 SSOA is an authentication broker and is implemented as plug-in installed in 
client side. When a user visits a web based system using explorer, SSOA distills HTTP 
Postdate, HTTP header used for login, reference address and authorization URI, and 
then constructs HTTP POST compatible data used for validation using the data returned 
by authentication broker server. 
 Once a user is validated by SSOA, he can use systems and resources 
registered in SSOA by means of cached credential list. 
 Due to the cached credential list, SSOA avoid adding excessive additional 
overhead and response time. SSOA communicates with authentication server via web 
service by SSL, thus obtaining as much generality as possible. SSOA achieves uniform 
identity authentication among heterogeneous systems, and attains most generality, 
simplicity and scalability with least cost as well.
Existing System 
Some have provided approaches to alleviate the trouble, such as auto 
completion supported by Microsoft, with which account and password inputted 
by a user for a specific URI can be automatically stored. When the URI is 
visited again, the password can be automatically filled by system as the 
account is typed or selected. Although auto-completion brings us convenience, 
it is not of security in the case of a computer with multiple users
Proposed System 
Single sign-on (SSO) is a property of access control of multiple, related, but 
independent software systems. With this property a user logs in once and gains access 
to all systems without being prompted to log in again at each of them. As different 
applications and resources support different authentication mechanisms, single sign-on 
has to internally translate to and store different credentials compared to what is used for 
initial authentication. 
There are various kinds of identity authorization systems for web applications. 
Many take a HTTP POST approach which submits a group of related information to 
authorization component for processing. No matter what information is required by login 
page, POST data constantly are HTTP header plus name/value pairs. When the 
name/value pair is received, a server deals with validation according to predefined 
processing logic.
Modules 
 Component Account Info 
 Component Credential 
 Component URI Broker 
 Authentication Broker Server
Component Account Info 
Component Account Info is used to store basic and important information of 
user accounts. Account Info has five properties: uID, uName, Password, Role, and 
Online. uID is the unique identifier of user account, uName represents account name, 
Password stores password for user to log in, Role is used to represent user account role 
in the system and Online is used to show whether an account is online . In Account Info, 
Password is stored in an encrypted style to ensure security. In the system, we use DES 
to encrypt the password. Therefore, when a user logs in, the password inputted should 
be encoded by DES before comparing with the stored password.
Component Credential 
Authentication broker server will return an authentication credential to user after 
validation using account and password to log in the server. Component credential is 
used to store user credential information. It has four properties: crdID, uID, cIP and 
eTime. crdID is the credential identifier, uID represents account identifier, cIP stands for 
current IP address of the machine user logged in, and eTime is used to figure out the 
expired time of user credential.
Component URI Broker 
Component URI Broker is used to save user broker data. After 
validation, authentication broker server will get POST data, HTTP header, 
reference URI and authentication URI from URI Broker. Component URIBroker 
has six properties: uID, lgURI, pData, hData, rURI and aURI. Property uID 
stands for user’s unique identifier, lgURI is the URI of the system for user to log 
in, pData is the HTTP post data, hData represents HTTP header data, rURI 
means reference URI and aURI is the URI for authentication. As most of 
properties of URIBroker are critical to users, they should be encrypted by 
SSOA, e.g. using DES algorithm. In our system, the data are ciphered by DES 
using keywords as key.
Authentication Broker Server 
SSOA is a plug-in which can be used in Microsoft Internet Explorer and 
Microsoft Windows browser, as well as those developed by other venders. 
Authentication broker service is a web service supplied by SSOA for users. SSOA client 
should log in authentication broker server to verify if the use can use the service.
Software and Hardware Specification 
Software Specification 
 Operating System : Windows 98/2000/XP 
 Web Technologies : Asp.NET 
 Language : C#.NET 
 Documentation Tool : Ms word 2000 
 Server : IIS 
 Framework : V2.0 
Hardware Specification 
 RAM : 256 MB and above 
 Processor : P3 and above 
 Hard Disk : 40 GB and above
Architecture Diagram

More Related Content

What's hot

Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7EAE
 
Secure Code Warrior - XQuery injection
Secure Code Warrior - XQuery injectionSecure Code Warrior - XQuery injection
Secure Code Warrior - XQuery injectionSecure Code Warrior
 
Web Single sign on system
Web Single sign on systemWeb Single sign on system
Web Single sign on systemSwati Sinha
 
Multi-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationMulti-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationUbisecure
 
Single sign on - SSO
Single sign on - SSOSingle sign on - SSO
Single sign on - SSOAjit Dadresa
 
SSO using CAS + two-factor authentication (PyGrunn 2014 talk)
SSO using CAS + two-factor authentication (PyGrunn 2014 talk)SSO using CAS + two-factor authentication (PyGrunn 2014 talk)
SSO using CAS + two-factor authentication (PyGrunn 2014 talk)Artur Barseghyan
 
Securing your APIs with OAuth, OpenID, and OpenID Connect
Securing your APIs with OAuth, OpenID, and OpenID ConnectSecuring your APIs with OAuth, OpenID, and OpenID Connect
Securing your APIs with OAuth, OpenID, and OpenID ConnectManish Pandit
 
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...Brian Culver
 
Secure Code Warrior - NoSQL injection
Secure Code Warrior - NoSQL injectionSecure Code Warrior - NoSQL injection
Secure Code Warrior - NoSQL injectionSecure Code Warrior
 
Apache shiro security framework
Apache shiro security frameworkApache shiro security framework
Apache shiro security frameworkAshokkumar T A
 
Authentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slidesAuthentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slidesrahul kundu
 
Protecting web APIs with OAuth 2.0
Protecting web APIs with OAuth 2.0Protecting web APIs with OAuth 2.0
Protecting web APIs with OAuth 2.0Vladimir Dzhuvinov
 
Authentication and Single Sing on
Authentication and Single Sing onAuthentication and Single Sing on
Authentication and Single Sing onguest648519
 

What's hot (20)

SINGLE SIGN-ON
SINGLE SIGN-ONSINGLE SIGN-ON
SINGLE SIGN-ON
 
Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7
 
Secure Code Warrior - XQuery injection
Secure Code Warrior - XQuery injectionSecure Code Warrior - XQuery injection
Secure Code Warrior - XQuery injection
 
Identity Management
Identity ManagementIdentity Management
Identity Management
 
SSO introduction
SSO introductionSSO introduction
SSO introduction
 
Web Single sign on system
Web Single sign on systemWeb Single sign on system
Web Single sign on system
 
Multi-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationMulti-Factor Authentication & Authorisation
Multi-Factor Authentication & Authorisation
 
Single Sign On - The Basics
Single Sign On - The BasicsSingle Sign On - The Basics
Single Sign On - The Basics
 
Single sign on - SSO
Single sign on - SSOSingle sign on - SSO
Single sign on - SSO
 
SSO using CAS + two-factor authentication (PyGrunn 2014 talk)
SSO using CAS + two-factor authentication (PyGrunn 2014 talk)SSO using CAS + two-factor authentication (PyGrunn 2014 talk)
SSO using CAS + two-factor authentication (PyGrunn 2014 talk)
 
Securing your APIs with OAuth, OpenID, and OpenID Connect
Securing your APIs with OAuth, OpenID, and OpenID ConnectSecuring your APIs with OAuth, OpenID, and OpenID Connect
Securing your APIs with OAuth, OpenID, and OpenID Connect
 
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
SharePoint 2010 Extranets and Authentication: How will SharePoint 2010 connec...
 
Secure Code Warrior - NoSQL injection
Secure Code Warrior - NoSQL injectionSecure Code Warrior - NoSQL injection
Secure Code Warrior - NoSQL injection
 
AAA server
AAA serverAAA server
AAA server
 
Apache shiro security framework
Apache shiro security frameworkApache shiro security framework
Apache shiro security framework
 
Authentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slidesAuthentication, authorization, accounting(aaa) slides
Authentication, authorization, accounting(aaa) slides
 
Access management
Access managementAccess management
Access management
 
Protecting web APIs with OAuth 2.0
Protecting web APIs with OAuth 2.0Protecting web APIs with OAuth 2.0
Protecting web APIs with OAuth 2.0
 
Single Sign On Considerations
Single Sign On ConsiderationsSingle Sign On Considerations
Single Sign On Considerations
 
Authentication and Single Sing on
Authentication and Single Sing onAuthentication and Single Sing on
Authentication and Single Sing on
 

Similar to Single sign on assistant an authentication brokers

Rest API Security - A quick understanding of Rest API Security
Rest API Security - A quick understanding of Rest API SecurityRest API Security - A quick understanding of Rest API Security
Rest API Security - A quick understanding of Rest API SecurityMohammed Fazuluddin
 
WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE
 WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE
WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATUREProfesia Srl, Lynx Group
 
Authentication Models
Authentication ModelsAuthentication Models
Authentication ModelsRaj Chanchal
 
WSO2 Identity Server - Product Overview
WSO2 Identity Server - Product OverviewWSO2 Identity Server - Product Overview
WSO2 Identity Server - Product OverviewWSO2
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossASRoger CARHUATOCTO
 
GHC18 Abstract - API Security, a Grail Quest
GHC18 Abstract - API Security, a Grail QuestGHC18 Abstract - API Security, a Grail Quest
GHC18 Abstract - API Security, a Grail QuestPaulaPaulSlides
 
SSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementSSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementManish Harsh
 
Web authentication & authorization
Web authentication & authorizationWeb authentication & authorization
Web authentication & authorizationAlexandru Pasaila
 
Exploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerExploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerNovell
 
secure and authentication using personal device ppt
secure and authentication using personal device pptsecure and authentication using personal device ppt
secure and authentication using personal device pptShiva Shiva
 
SPCA2013 - It’s Me, and Here’s My ProofIdentity & Authentication in SharePoin...
SPCA2013 - It’s Me, and Here’s My ProofIdentity & Authentication in SharePoin...SPCA2013 - It’s Me, and Here’s My ProofIdentity & Authentication in SharePoin...
SPCA2013 - It’s Me, and Here’s My ProofIdentity & Authentication in SharePoin...NCCOMMS
 
Open source wso2 identity server sso with drupal 8
Open source wso2 identity server sso with drupal 8Open source wso2 identity server sso with drupal 8
Open source wso2 identity server sso with drupal 8Iwantha Lekamge
 
Novell® iChain® 2.3
Novell® iChain® 2.3Novell® iChain® 2.3
Novell® iChain® 2.3webhostingguy
 
OAuth with Salesforce - Demystified
OAuth with Salesforce - DemystifiedOAuth with Salesforce - Demystified
OAuth with Salesforce - DemystifiedCalvin Noronha
 

Similar to Single sign on assistant an authentication brokers (20)

Presentation
PresentationPresentation
Presentation
 
encryption ppt
encryption pptencryption ppt
encryption ppt
 
Rest API Security - A quick understanding of Rest API Security
Rest API Security - A quick understanding of Rest API SecurityRest API Security - A quick understanding of Rest API Security
Rest API Security - A quick understanding of Rest API Security
 
WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE
 WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE
WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE
 
Authentication Models
Authentication ModelsAuthentication Models
Authentication Models
 
Securing RESTful API
Securing RESTful APISecuring RESTful API
Securing RESTful API
 
WSO2 Identity Server - Product Overview
WSO2 Identity Server - Product OverviewWSO2 Identity Server - Product Overview
WSO2 Identity Server - Product Overview
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossAS
 
GHC18 Abstract - API Security, a Grail Quest
GHC18 Abstract - API Security, a Grail QuestGHC18 Abstract - API Security, a Grail Quest
GHC18 Abstract - API Security, a Grail Quest
 
Ch08 Authentication
Ch08 AuthenticationCh08 Authentication
Ch08 Authentication
 
SSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementSSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy Management
 
Web authentication & authorization
Web authentication & authorizationWeb authentication & authorization
Web authentication & authorization
 
Exploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerExploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access Manager
 
secure and authentication using personal device ppt
secure and authentication using personal device pptsecure and authentication using personal device ppt
secure and authentication using personal device ppt
 
SPCA2013 - It’s Me, and Here’s My ProofIdentity & Authentication in SharePoin...
SPCA2013 - It’s Me, and Here’s My ProofIdentity & Authentication in SharePoin...SPCA2013 - It’s Me, and Here’s My ProofIdentity & Authentication in SharePoin...
SPCA2013 - It’s Me, and Here’s My ProofIdentity & Authentication in SharePoin...
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
Open source wso2 identity server sso with drupal 8
Open source wso2 identity server sso with drupal 8Open source wso2 identity server sso with drupal 8
Open source wso2 identity server sso with drupal 8
 
AzureAAD
AzureAADAzureAAD
AzureAAD
 
Novell® iChain® 2.3
Novell® iChain® 2.3Novell® iChain® 2.3
Novell® iChain® 2.3
 
OAuth with Salesforce - Demystified
OAuth with Salesforce - DemystifiedOAuth with Salesforce - Demystified
OAuth with Salesforce - Demystified
 

More from Finalyear Projects

Emotion recognition from facial expression using fuzzy logic
Emotion recognition from facial expression using fuzzy logicEmotion recognition from facial expression using fuzzy logic
Emotion recognition from facial expression using fuzzy logicFinalyear Projects
 
Energy efficient reverse skyline query processing over wireless sensor networks
Energy efficient reverse skyline query processing over wireless sensor networksEnergy efficient reverse skyline query processing over wireless sensor networks
Energy efficient reverse skyline query processing over wireless sensor networksFinalyear Projects
 
REAL TIME PROJECTS IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
REAL TIME PROJECTS  IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...REAL TIME PROJECTS  IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
REAL TIME PROJECTS IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...Finalyear Projects
 
Scalable scheduling of updates in streaming data warehouses
Scalable scheduling of updates in streaming data warehousesScalable scheduling of updates in streaming data warehouses
Scalable scheduling of updates in streaming data warehousesFinalyear Projects
 
Detection and localization of multiple spoofing attacks in
Detection and localization of multiple spoofing attacks inDetection and localization of multiple spoofing attacks in
Detection and localization of multiple spoofing attacks inFinalyear Projects
 
A novel vlsi dht algorithm for a highly
A novel vlsi dht algorithm for a highlyA novel vlsi dht algorithm for a highly
A novel vlsi dht algorithm for a highlyFinalyear Projects
 
A novel vlsi dht algorithm for a highly
A novel vlsi dht algorithm for a highlyA novel vlsi dht algorithm for a highly
A novel vlsi dht algorithm for a highlyFinalyear Projects
 
Fpga implementation of truncated multiplier for array multiplication
Fpga implementation of truncated multiplier for array multiplicationFpga implementation of truncated multiplier for array multiplication
Fpga implementation of truncated multiplier for array multiplicationFinalyear Projects
 
Towards energy efficient big data gathering
Towards energy efficient big data gatheringTowards energy efficient big data gathering
Towards energy efficient big data gatheringFinalyear Projects
 
Java ieee projects titles 2014 2015
Java ieee projects  titles 2014 2015Java ieee projects  titles 2014 2015
Java ieee projects titles 2014 2015Finalyear Projects
 
System proposal and crs model design applying
System proposal and crs model design applyingSystem proposal and crs model design applying
System proposal and crs model design applyingFinalyear Projects
 
Discovering emerging topics in social streams via link anomaly detection
Discovering emerging topics in social streams via link anomaly detectionDiscovering emerging topics in social streams via link anomaly detection
Discovering emerging topics in social streams via link anomaly detectionFinalyear Projects
 
Navigation by the soles of your feet
Navigation by the soles of your feetNavigation by the soles of your feet
Navigation by the soles of your feetFinalyear Projects
 
Android Mobile - Home Automation
Android Mobile - Home Automation Android Mobile - Home Automation
Android Mobile - Home Automation Finalyear Projects
 

More from Finalyear Projects (17)

Emotion recognition from facial expression using fuzzy logic
Emotion recognition from facial expression using fuzzy logicEmotion recognition from facial expression using fuzzy logic
Emotion recognition from facial expression using fuzzy logic
 
Energy efficient reverse skyline query processing over wireless sensor networks
Energy efficient reverse skyline query processing over wireless sensor networksEnergy efficient reverse skyline query processing over wireless sensor networks
Energy efficient reverse skyline query processing over wireless sensor networks
 
REAL TIME PROJECTS IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
REAL TIME PROJECTS  IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...REAL TIME PROJECTS  IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
REAL TIME PROJECTS IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
 
Scalable scheduling of updates in streaming data warehouses
Scalable scheduling of updates in streaming data warehousesScalable scheduling of updates in streaming data warehouses
Scalable scheduling of updates in streaming data warehouses
 
IEEE Projects 2014-2015
IEEE Projects 2014-2015IEEE Projects 2014-2015
IEEE Projects 2014-2015
 
Detection and localization of multiple spoofing attacks in
Detection and localization of multiple spoofing attacks inDetection and localization of multiple spoofing attacks in
Detection and localization of multiple spoofing attacks in
 
A novel vlsi dht algorithm for a highly
A novel vlsi dht algorithm for a highlyA novel vlsi dht algorithm for a highly
A novel vlsi dht algorithm for a highly
 
A novel vlsi dht algorithm for a highly
A novel vlsi dht algorithm for a highlyA novel vlsi dht algorithm for a highly
A novel vlsi dht algorithm for a highly
 
Fpga implementation of truncated multiplier for array multiplication
Fpga implementation of truncated multiplier for array multiplicationFpga implementation of truncated multiplier for array multiplication
Fpga implementation of truncated multiplier for array multiplication
 
Keyword query routing
Keyword query routingKeyword query routing
Keyword query routing
 
Towards energy efficient big data gathering
Towards energy efficient big data gatheringTowards energy efficient big data gathering
Towards energy efficient big data gathering
 
Java ieee projects titles 2014 2015
Java ieee projects  titles 2014 2015Java ieee projects  titles 2014 2015
Java ieee projects titles 2014 2015
 
System proposal and crs model design applying
System proposal and crs model design applyingSystem proposal and crs model design applying
System proposal and crs model design applying
 
Discovering emerging topics in social streams via link anomaly detection
Discovering emerging topics in social streams via link anomaly detectionDiscovering emerging topics in social streams via link anomaly detection
Discovering emerging topics in social streams via link anomaly detection
 
Navigation by the soles of your feet
Navigation by the soles of your feetNavigation by the soles of your feet
Navigation by the soles of your feet
 
Android Mobile - Home Automation
Android Mobile - Home Automation Android Mobile - Home Automation
Android Mobile - Home Automation
 
Home automation
Home automationHome automation
Home automation
 

Recently uploaded

Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxRosabel UA
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsRommel Regala
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxJanEmmanBrigoli
 

Recently uploaded (20)

Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World Politics
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptx
 

Single sign on assistant an authentication brokers

  • 1. Single Sign-On Assistant: An Authentication Broker for Web Applications
  • 2. TARGETJ SOLUTIONS • REAL TIME PROJECTS • IEEE BASED PROJECTS • EMBEDDED SYSTEMS • PAPER PUBLICATIONS • MATLAB PROJECTS • targetjsolutions@gmail.com • (0)9611582234, (0)9945657526
  • 3. Aim Single sign-on assistant for web based applications, called SSOA, aiming at ‘logging in once, running everywhere’, with which we would solve uniform identity authentication among heterogeneous systems attaining simplicity, scalability and relatively low cost.
  • 4. Synopsis  Web-based systems are now widely used in many fields. Users are usually required to conduct identity authentication separately when logging in different systems before getting service.  For the sake of security, it is improper to use a global identifier and password among several systems.  Many approaches are proposed to solve the problem, among which single sign-on (SSO) is most popular schema with which a user logs in once and gains access to all systems without having to log in again. We put up a single sign-on assistant, called SSOA, for web-based applications.
  • 5. Synopsis  SSOA is an authentication broker and is implemented as plug-in installed in client side. When a user visits a web based system using explorer, SSOA distills HTTP Postdate, HTTP header used for login, reference address and authorization URI, and then constructs HTTP POST compatible data used for validation using the data returned by authentication broker server.  Once a user is validated by SSOA, he can use systems and resources registered in SSOA by means of cached credential list.  Due to the cached credential list, SSOA avoid adding excessive additional overhead and response time. SSOA communicates with authentication server via web service by SSL, thus obtaining as much generality as possible. SSOA achieves uniform identity authentication among heterogeneous systems, and attains most generality, simplicity and scalability with least cost as well.
  • 6. Existing System Some have provided approaches to alleviate the trouble, such as auto completion supported by Microsoft, with which account and password inputted by a user for a specific URI can be automatically stored. When the URI is visited again, the password can be automatically filled by system as the account is typed or selected. Although auto-completion brings us convenience, it is not of security in the case of a computer with multiple users
  • 7. Proposed System Single sign-on (SSO) is a property of access control of multiple, related, but independent software systems. With this property a user logs in once and gains access to all systems without being prompted to log in again at each of them. As different applications and resources support different authentication mechanisms, single sign-on has to internally translate to and store different credentials compared to what is used for initial authentication. There are various kinds of identity authorization systems for web applications. Many take a HTTP POST approach which submits a group of related information to authorization component for processing. No matter what information is required by login page, POST data constantly are HTTP header plus name/value pairs. When the name/value pair is received, a server deals with validation according to predefined processing logic.
  • 8. Modules  Component Account Info  Component Credential  Component URI Broker  Authentication Broker Server
  • 9. Component Account Info Component Account Info is used to store basic and important information of user accounts. Account Info has five properties: uID, uName, Password, Role, and Online. uID is the unique identifier of user account, uName represents account name, Password stores password for user to log in, Role is used to represent user account role in the system and Online is used to show whether an account is online . In Account Info, Password is stored in an encrypted style to ensure security. In the system, we use DES to encrypt the password. Therefore, when a user logs in, the password inputted should be encoded by DES before comparing with the stored password.
  • 10. Component Credential Authentication broker server will return an authentication credential to user after validation using account and password to log in the server. Component credential is used to store user credential information. It has four properties: crdID, uID, cIP and eTime. crdID is the credential identifier, uID represents account identifier, cIP stands for current IP address of the machine user logged in, and eTime is used to figure out the expired time of user credential.
  • 11. Component URI Broker Component URI Broker is used to save user broker data. After validation, authentication broker server will get POST data, HTTP header, reference URI and authentication URI from URI Broker. Component URIBroker has six properties: uID, lgURI, pData, hData, rURI and aURI. Property uID stands for user’s unique identifier, lgURI is the URI of the system for user to log in, pData is the HTTP post data, hData represents HTTP header data, rURI means reference URI and aURI is the URI for authentication. As most of properties of URIBroker are critical to users, they should be encrypted by SSOA, e.g. using DES algorithm. In our system, the data are ciphered by DES using keywords as key.
  • 12. Authentication Broker Server SSOA is a plug-in which can be used in Microsoft Internet Explorer and Microsoft Windows browser, as well as those developed by other venders. Authentication broker service is a web service supplied by SSOA for users. SSOA client should log in authentication broker server to verify if the use can use the service.
  • 13. Software and Hardware Specification Software Specification  Operating System : Windows 98/2000/XP  Web Technologies : Asp.NET  Language : C#.NET  Documentation Tool : Ms word 2000  Server : IIS  Framework : V2.0 Hardware Specification  RAM : 256 MB and above  Processor : P3 and above  Hard Disk : 40 GB and above