Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication.

21

Transcript of Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication.

Page 1: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication.
Page 2: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication.
Page 3: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication.
Page 4: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication.
Page 5: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication.

Single Sign-On(SSO)

Page 6: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication.

Single Sign-On(SSO)

Strong Authentication

Page 7: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication.

Single Sign-On(SSO)

Strong Authentication

KNOW *******

Page 8: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication.

Single Sign-On(SSO)

Strong Authentication

KNOW *******

HAVE

Page 9: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication.

Single Sign-On(SSO)

Strong Authentication

KNOW *******

HAVE

ARE

Page 10: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication.

Single Sign-On(SSO)

Strong Authentication

KNOW *******

HAVE

Page 11: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication.

Single Sign-On(SSO)

Strong Authentication

KNOW *******

HAVE

Page 12: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication.

Strong Mobile Authentication in Single Sign-On Systems

André [email protected]

Page 13: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication.

Overview

• Objectives• Protocol arquitecture and description• Prototype overview• Demo• Conclusion

André [email protected]

Page 14: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication.

Objectives

• Strong Authentication protocol for SSO systems using the mobile phone as a security token– Security, usability, flexibility, cost-efficiency

André [email protected]

• Implmentation prototype– Proof-of-concept– Usable strong authentication method using the

mobile phone as an alternative in SSO authentication

Page 15: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication.

Protocol - Arquitecture

André [email protected]

Page 16: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication.

Protocol - Arquitecture

André [email protected]

Page 17: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication.

Protocol - Description

André [email protected]

Page 18: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication.

Prototype - Overview

André [email protected]

Page 19: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication.

Prototype - Demo

André [email protected]

Page 20: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication.

Conclusion

André [email protected]

• SSO and strong authentication complement each other

• Mobile phone is a beneficial option as a security token and there are secure mechanisms that enhance it

• Protocol enables the creation of secure, usable, flexible and cost-efficient strong authentication methods

• Implementation prototype

Page 21: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication.

André [email protected]

Questions?