Single Sign-On Assistant: An Authentication Broker for Web Applications

被引:0
作者
Zhu, Fei [1 ]
Diao, Hongjun [1 ]
机构
[1] Soochow Univ, Sch Comp Sci & Technol, Suzhou 215006, Peoples R China
来源
THIRD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING: WKDD 2010, PROCEEDINGS | 2010年
关键词
authentication; single sign on; security; SSL; plug in;
D O I
10.1109/WKDD.2010.94
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Web-based systems are now widely used in many fields. Users are usually required to conduct identity authentication separately when logging in different systems before getting service. For the sake of security, it is improper to use a global identifier and password among several systems. Many approaches are proposed to solve the problem, among which single sign-on (SSO) is most popular schema with which a user logs in once and gains access to all systems without having to log in again. We put up a single sign-on assistant, called SSOA, for web-based applications. SSOA is an authentication broker and is implemented as plug-in installed in client side. When a user visits a web-based system using explorer, SSOA distills HTTP POST data, HTTP header used for login, reference address and authorization URI, and then constructs HTTP POST compatible data used for validation using the data returned by authentication broker server. Once a user is validated by SSOA, he can use systems and resources registered in SSOA by means of cached credential list. Due to the cached credential list, SSOA avoid adding excessive additional overhead and response time. SSOA communicates with authentication server via web service by SSL, thus obtaining as much generality as possible. SSOA achieves uniform identity authentication among heterogeneous systems, and attains most generality, simplicity and scalability with least cost as well.
引用
收藏
页码:146 / 149
页数:4
相关论文
共 16 条
  • [1] An Infocard-based proposal for unified single sign on
    de la Hoz, Enrique
    Garcia, Antonio
    Marsa-Maestre, Ivan
    Angel Lopez-Carmona, Miguel
    Alarcos, Bernardo
    [J]. 2009 9TH ANNUAL INTERNATIONAL SYMPOSIUM ON APPLICATIONS AND THE INTERNET, 2009, : 231 - 234
  • [2] DUAN YX, 2008, 2008 INT S COMP SCI, V2, P15
  • [3] Research and Implementation of Key Technology Based on Internet Encryption and Authentication
    Fang Ying-lan
    Han Bing
    Li Ye-bai
    [J]. 2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 1, PROCEEDINGS, 2009, : 179 - 182
  • [4] GOOLD J, 2007, ICIMP 2 INT C INT MO, P8
  • [5] An Improved Authentication Protocol with Less Delay for UMTS Mobile Networks
    Hu Yan-zhi
    Ma Da-wei
    Li Xiao-fei
    [J]. 2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 2, PROCEEDINGS, 2009, : 111 - 115
  • [6] HUANG W, 2009, WESE 2 INT WORKSH CO, P234
  • [7] Liu J, 2009, 2009 FOURTH INTERNATIONAL CONFERENCE ON INTERNET AND WEB APPLICATIONS AND SERVICES, P30, DOI 10.1109/ICIW.2009.13
  • [8] Binding identities and attributes using digitally signed certificates
    Park, JS
    Sandhu, R
    [J]. 16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 120 - 127
  • [9] User-centric Identity Management in heterogeneous Federations
    Rieger, Sebastian
    [J]. 2009 FOURTH INTERNATIONAL CONFERENCE ON INTERNET AND WEB APPLICATIONS AND SERVICES, 2009, : 527 - 532
  • [10] Samar V., 1999, Proceedings. IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'99), P158, DOI 10.1109/ENABL.1999.805192