How to Integrate On-premise Authentication System into Cloud Services: Single Sign-on for Office365

Author(s):  
Tsuyoshi Akiyama ◽  
Takayuki Nagai ◽  
Hideo Masuda ◽  
Hiromi Yamaoka
2013 ◽  
Vol 30 (5) ◽  
pp. 410 ◽  
Author(s):  
Min-Shiang Hwang ◽  
Tsuei-Hung Sun

2021 ◽  
Vol 109 (4) ◽  
Author(s):  
Joanne Romano ◽  
Nha Huynh

Background: The Texas Medical Center (TMC) is home to one of the world’s largest cohorts of faculty, students, researchers, and clinicians who rely on seamless and immediate access to digital biomedical and health resources. This group is served by the TMC Library, with a collection that includes over 380,000 ebooks and 59,000 ejournals. In 2018, the TMC Library implemented OpenAthens, a federated authentication system to replace a locally hosted instance of EZproxy.Case Presentation: The TMC Library is unique in its multi-institutional user population, which presents distinct challenges in adopting a single sign-on authentication system. Our project involved OpenAthens technical support, information technology teams from six academic institutions, and over thirty publishers. Implementation included the creation of an OpenAthens parent account, an active user directory, a resource catalog, and installation of our OpenAthens credentials at each publisher site. Because the TMC Library serves multiple institutions, OpenAthens built a custom login page and a portal to support both single sign-on and a generic username and password option. This case report discusses the reasons why OpenAthens was chosen, the preparation methods for implementation, the various challenges encountered and resolved, and recommendations for other health sciences libraries considering this system.Conclusions: The OpenAthens system provides important benefits: granular usage reports, single sign-on access, and data to negotiate reduced pricing for online resources. With prior knowledge and preparation, health sciences libraries can successfully implement OpenAthens with customizations tailored to their specific resources and user population.


2016 ◽  
Vol 59 (6) ◽  
pp. 605-614 ◽  
Author(s):  
Brian Cusack ◽  
Eghbal Ghazizadeh

Author(s):  
G. Nivedhitha ◽  
R. Ilakkiya

Cloud computing is a way to increase the capacity or add capabilities dynamically without any upfront investments. Despite the growth achieved from the cloud computing, security is still questionable which impacts the cloud model adoption. Aside of having network and application securities being adopted, there must be a security that authenticate the user when accessing the cloud services that is bound to the rules between the cloud computing provider and the client side. The existing system provides authentication based on keys Encryption algorithms either symmetric key-based or asymmetric are key-based. Both encryption approaches have a major problem related to encryption key management i.e. how to securely generate, store, access and exchange secrete keys. In this paper, an optimized infrastructure for secure authentication and authorization in Cloud Environment using SSO (Single Sign-On) is proposed. SSO is a process of authenticating once and gain access of multiple resources that aims at reducing number of login and password in heterogeneous environment and to gain balance in Security, Efficiency and Usability. Also an authentication model for cloud computing based on the Kerberos protocol to provide single sign-on and to prevent against DDOS attacks is also presented in this paper.


2019 ◽  
Author(s):  
Madhusudhana H. S.

Authentication is the first and foremost security principle that involves validation of identity of an user or a machine. The successful authentication is required for authorization and secure data exchanges. A common classification of authentication system based on factors – something you know, something you own, something you did and something you are – is explained. Well-known and used password schemes employed in practice is described along with standards. A description Kerberos of authentication system based on symmetric key encryption and SSL based authentication which is based on public key encryption is given. Related Single-Sign-On technologies are explained. A brief overview of authentication for cloud computing, IoT and UIDAI is presented.


2018 ◽  
Vol 9 (1) ◽  
pp. 12-21
Author(s):  
Guntoro Guntoro ◽  
Muhammad Fikri

Aplikasi single sign-on (SSO) adalah sebuah sistem otentikasi login yang mengizinkan bagi seorang pengguna dapat mengakses banyak sistem hanya dengan satu akun aja. Dengan sistem single sign-on (SSO) tersebut, seorang user sistem aplikasi hanya cukup melakukan otentikasi sekali saja untuk masuk ke semua layanan yang terdapat pada dalam sistem aplikasi. Otentikasi login berbasis teks pada sistem single sign-on (SSO) yang sudah ada saat ini, mempunyai kelemahan, salah satunya adalah pencurian password dengan aplikasi keylogger. Perancangan aplikasi sistem single sign-on (SSO) yang dikembangkan dengan mencoba menambahkan otentikasi menggunakan gambar. Gambar yang digunakan telah diberikan sebuah keamanan yaitu menggunakan teknik steganografi dengan metode Least Significant Bit. Abstract Single sign-on (SSO) application is a login authentication system that allows a user to access multiple systems with just one account. With a single sign-on (SSO) system, an application system user only just authenticates once to log in to all services contained in the application system. Text-based login authentication on existing single sign-on (SSO) systems, has a weakness, one of which is password theft with keylogger apps. The design of single sign-on (SSO) system applications developed by trying to add authentication using images. The image used has been given a security that is using steganography technique with a method of the Least Significant Bit. .


Author(s):  
H A Gautham ◽  
◽  
Dr. Ramakanth Kumar P ◽  

Authentication is a process of verifying the credibility of a user who is trying to access classified or confidential information. There is a vast unfold in the number of internet users, and the demand for IoT devices, cloud services has been increasing; it is now essential more than ever to protect the data hosted on the internet. So, the authentication process cannot be relied on single-factor static authentication methods to verify the user credentials. All devices in the market are not equipped with biometric systems, so a form of multi-factor authentication which is independent of biometrics needs to be adopted for a secure authentication system. This paper portraits a systematic architecture to verify user credentials using specific parameters, trying to unfold patterns using machine learning algorithms based on user's past login records, thus trying to provide a safer and secure authentication process for the users.


Author(s):  
K Gangadhara Rao ◽  
Vijayakumari Rodda ◽  
B Basaveswara Rao

<p>Cloud computing is increasingly becoming popular as many enterprise applications and data are moving into cloud platforms. However, a major barrier for cloud application is real and perceived lack of security. There are many security mechanisms exercised to utilize cloud services. Amongst them the prominent and primitive security mechanism is the Authentication System. Traditional text based passwords are susceptible to threats. Tough passwords are hard to recall and easily recalled passwords are simple and predictable. Graphical passwords are introduced as the better alternative. Two types of graphical passwords are there – recall based and recognition based. This research reviews several Recognition-Based Graphical Password methods and analyses their security based on the estimation criteria. Moreover, the research defines a metric called a 14-point scale that would make it possible for the qualitative analysis of the graphical passwords schemes. </p>


2014 ◽  
Vol 926-930 ◽  
pp. 2245-2248
Author(s):  
Li Jia

According to the single sign-on authentication mode, cloud computing unified login authentication method was put forward, and point set topology changing method was used for generating fractal random key, improved login authentication safety grade. Firstly, analyzed cloud computing login authentication system structure, and then used network public databases of fingerprint image as an example do fractal changes ring operation, generated a pseudo-random sequence, then the sequence encrypted and sent to the server for authentication through UDP. Lastly, made a simulation example.


2012 ◽  
Vol 6-7 ◽  
pp. 843-847
Author(s):  
Chuan Xie

The application of LAN in enterprises has become wider and wider, it brings efficiency and convenience to management and production, but at the same time, security threat is increasing. This threat is influenced by the factors such as network environment, network management and the level of the staff. Therefore it causes the realization of LAN security strategic planning is not entirely reliable, reflecting mainly in the subjective factors such as network user identity authentication. Through research, on the basis of the application of Single Sign-On technology and introducing the agency identity authentication system, a new security strategy is built up, which can improve the whole LAN security.


Sign in / Sign up

Export Citation Format

Share Document