Preview

Federated Identity Advantages And Disadvantages

Good Essays
Open Document
Open Document
417 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Federated Identity Advantages And Disadvantages
Federated Identity is a means through which a service or application does not need to obtain and store users’ credentials to authenticate users. Instead it can use another service or application, which acts as a repository of users’ identities, to authenticate the user. This has two main benefits:
• Users do not need to remember a lot of credentials as there are only a few sites where they have their identity stored which can be used to sign into other sites.
• These selected sites have identity management as one of their core competencies which means they provide a higher level of security and protection to the data they store.

Open ID Connect is a simple JSON\ REST- based interoperable identity protocol built on top of OAuth2.0. Its design
…show more content…
The specification suite also provides a mechanism to optionally support encryption of identity data, discovery of the OpenID Providers, and advanced session management, including logout.
It provides flexible user authentication by allowing identity providers to choose their preferred way of authentication such as username/password, hardware tokens, biometrics, etc. It provides built-in user provisioning by defining a UserInfo HTTPS endpoint for authorized client applications to retrieve consented information about the logged in user. The Open ID Connect server provides client applications with two key tokens-
• ID token: It can be compared with an identity card in a digital format. A typical ID token contains a JSON object with the following details:
1. User
…show more content…
Issuing authority
3. Client application
4. Time of issue and expiry
5. How and when was authentication done
• Access token: It can be compared with a physical token or a ticket. It permits user access to a specific HTTP resource or web service. Open ID Connect employs OAuth2.0 access tokens.

OpenID Connect is designed for the consumer-to-social-network scenario, but can potentially be deployed in different use cases such as identity federation or federation single sign on. Some big vendors (Google, Microsoft) support OpenID Foundation in their development effort. OpenID Connect achieves the same goals that SAML 2.0 is currently used for but It has certain features such as asking for user consent, can deal with higher levels of assurance and supports IdP discovery, dynamic client registration, and session management though these are optional

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The trusted site feature. It ensures that the sites which provides our personal information takes precautions to protect our data by giving limited access to foreign users.…

    • 418 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 8 Lab 1

    • 421 Words
    • 2 Pages

    9. An open-source implementation of the SSL and TLS protocols. The core library, written in the C programming language, implements the basic cryptographic functions and provides various utility functions.…

    • 421 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    34. Kerberos is an example of a single sign-on system providing enterprises with scalability and flexibility.…

    • 352 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    Authentication and Authorization are two interrelated security concepts. Authentication and authorization are required for a Web page that should be limited to certain users:-…

    • 711 Words
    • 3 Pages
    Good Essays
  • Good Essays

    An extra layer of authentication for the security of resources by two-step verification. The combination of any two or more veri-fication methods (password, biometrics, trusted device).…

    • 553 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Ch05EOCAs

    • 2578 Words
    • 13 Pages

    When users log onto Active Directory, they receive a(n) _access token_ consisting of all of their security group memberships. P103…

    • 2578 Words
    • 13 Pages
    Satisfactory Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cac Card

    • 1716 Words
    • 7 Pages

    Public key infrastructure (pki) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections.…

    • 1716 Words
    • 7 Pages
    Good Essays
  • Good Essays

    A federation is defined as a group of business partner who work together (Axel Buecker et al, 2008) and according to (CERN OPEN, 2013), Federated Identity Management (FIM) is an arrangement that can be made by multiple organisations that lets subscribers use the same identifications data to get access to the secured resources of all organisations in the…

    • 479 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Mathias (2013) stated that identity management (ID management) is defined as a wide-ranging area that manages the personal identification during a system, (such as a country or a social networking) and have access to gain resources from it through associating user rights and restriction with established identity.…

    • 1633 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Password Theft

    • 6445 Words
    • 26 Pages

    Authorization is the process of giving someone permission to do or have something. In multi-user computer systems, a system administrator defines for the system which users are allowed access to the system and what privileges of use (such as access to which file directories, hours of access, amount of allocated storage space, and so forth). Thus, authorization is sometimes seen as both the preliminary setting up of permissions by a system administrator and the actual checking of the permission values that have been set up when a user is getting access.…

    • 6445 Words
    • 26 Pages
    Powerful Essays
  • Powerful Essays

    features useful. Business Security Profiles are assigned directly to users and groups from the IDT Security…

    • 1010 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    The basic principle on which OpenID works is called “decentralized authentication” and its primary purpose is to establish “who you are”. It barres the third-party applications intending to integrate with OpenID supported identity provider from writing its own site-specific authentication logic. In this way, a user can login to multiple OpenID enabled website using a single existing social site userid/password combination. Under the hood, OpenID provider grants an URL like unique identifier to its users (E.g. Yahoo OpenID identifier would look like https://me.yahoo.com/a/uaStkHdgs_7BxVAc1FofG0xxxxxxxxxxxxxx.xxxxxck-) and the identifier is then matched once user authenticates to OpenID provider using the provider specific user credential. Point to be noted here, user would need to enter user ID and password in the provider Sign In page (say Yahoo! Sign In page) ONLY, not in any other application login page. Therefore, no website will ever see your password. Some market leading OpenID providers are Google, Yahoo!, Microsoft…

    • 1273 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Liberal Democracy

    • 1099 Words
    • 5 Pages

    As you can see, IDs are citizen participation intensive (CPI). CPI means that all citizens must play an active role in their democracy. They must be well informed and well educated on all the issues in their democracy. For this reason, IDs are quite fragile and difficult to get started.…

    • 1099 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    College and university initiatives in enhanced networking connectivity and in advanced applications development are the fundamental for building more knowledge communities. Application areas include digital libraries, remote medical diagnosis, and others. For reasons of security, licensing, etc., people and resources will require unique identities that are properly authenticated and authorized for access. Since application users will connect with people and resources at both local and remote campuses, both campus wide infrastructures and inter-campus communication mechanisms will be needed.…

    • 1944 Words
    • 8 Pages
    Powerful Essays