Formal analysis of SAML 2.0 web browser single sign-on

Author(s):  
Alessandro Armando ◽  
Roberto Carbone ◽  
Luca Compagna ◽  
Jorge Cuellar ◽  
Llanos Tobarra
2020 ◽  
Vol 23 (3) ◽  
pp. 1-37
Author(s):  
Giada Sciarretta ◽  
Roberto Carbone ◽  
Silvio Ranise ◽  
Luca Viganò

2020 ◽  
Vol 1 (2) ◽  
pp. 127
Author(s):  
Indra Gita Anugrah ◽  
Muhamad Aldi Rifai Imam Fakhruddin

The security of an application is the most important problem in an information system integration process. The authentication and authorization process is usually carried out using Single Sign On (SSO). Authentication and authorization methods are used to secure data in a system. The authentication and authorization processes are carried out on the client side (web browser) in the form of a session and on the server side (web server) in the form of cookies. Sessions and cookies are valuable assets in the authentication and authorization process because they contain the data required for the login process so that the session and cookies need to be secured. Session is a combination of username and password data that has been encrypted while cookies store login information data so that they are still in a state of gaining access according to the privileges given to the user. So important is the role of sessions and cookies in the authentication and authorization process, so we need a way to secure data on sessions and cookies. One way to secure data is to use the REst API and Auth Token.


2005 ◽  
Vol 14 (05) ◽  
pp. 923-930 ◽  
Author(s):  
DONGXI ZHENG ◽  
SHAOHUA TANG ◽  
SHAOFA LI

Web Services technology is suitable for cross-platform and cross-application integration. To secure systems based on Web Services, a single sign-on protocol for Web Services supporting several login modes are presented. The architecture and the formalized flow of the protocol are described. The protocol is also analyzed and proven using an extended SVO logic.


Author(s):  
Alessandro Armando ◽  
Roberto Carbone ◽  
Luca Compagna ◽  
Giancarlo Pellegrino

Single-Sign-On (SSO) protocols enable companies to establish a federated environment in which clients sign in the system once and yet are able to access to services offered by different companies. The OASIS Security Assertion Markup Language (SAML) 2.0 Web Browser SSO Profile is the emerging standard in this context. In previous work a severe security flaw in the SAML-based SSO for Google Apps was discovered. By leveraging this experience, this chapter will show that model checking techniques for security protocols can support the development and analysis of SSO solutions helping the designer not only to detect serious security flaws early in the development life-cycle but also to provide assurance on the security of the solutions identified.


2020 ◽  
Vol 5 (01) ◽  
pp. 19-33
Author(s):  
A. Taqwa Martadinata ◽  
Firdaus Firdaus

Teknologi Informasi (TI) serta Sistem Informasi (SI) saat ini wajib ada dalam menunjang sebuah organisasi atau perusahaan. Arsitektur yang baik beserta dokumentasinya yang sesuai memungkinkan kemudahan pemeliharaan agar sistem tidak menjadi usang. Dalam  hal  ini  arsitektur  TI didefinisikan  sebagai framework yang  terintegrasi  untuk  mengembangkan  atau memelihara  TI  yang  ada  dan  memperoleh  TI  yang  baru  untuk  mencapai  tujuan strategis organisasi. The Open Group Architectural Framework (TOGAF): Kuat pada Aspek Arsitektur Bisnis dan Arsitektur Teknis. Pada penelitian ini menggunakan TOGAF ADM mulai dari fase pendahuluan, kebutuhan manajemen, visi arsitektur, bisnis arsitektur, arsitektur system informasi, arsitektur teknologi,serta solusi dan peluang. Menetapkan 3 prinsip pengembangan arsitektur informasi teknologi adaptif pada Universitas Bina Insan. Pengembangan aplikasi berbasis single sign on (sso) untuk intergrasi antar system. Merupakan sebuah hasil dari penelitian ini yang dapat menghasilkan sebuah rancangan infrastruktur teknologi informasi yang berifat adaftip dengan konsep yang di adopsi berupa teknologi virtualisasi server, serta pemanfaatan proses bisnis mampu berjalan efisien, efektif serta sesuai yang diinginkan manajemen.


2015 ◽  
Vol 1 (1) ◽  
pp. 37-45
Author(s):  
Irwansyah Irwansyah ◽  
Hendra Kusumah ◽  
Muhammad Syarif

Along with the times, recently there have been found tool to facilitate human’s work. Electronics is one of technology to facilitate human’s work. One of human desire is being safe, so that people think to make a tool which can monitor the surrounding condition without being monitored with people’s own eyes. Public awareness of the underground water channels currently felt still very little so frequent floods. To avoid the flood disaster monitoring needs to be done to underground water channels.This tool is controlled via a web browser. for the components used in this monitoring system is the Raspberry Pi technology where the system can take pictures in real time with the help of Logitech C170 webcam camera. web browser and Raspberry Pi make everyone can control the devices around with using smartphone, laptop, computer and ipad. This research is expected to be able to help the users in knowing the blockage on water flow and monitored around in realtime.


Sign in / Sign up

Export Citation Format

Share Document