2012 IEEE International Conference on Automation and Logistics 2012
DOI: 10.1109/ical.2012.6308228
|View full text |Cite
|
Sign up to set email alerts
|

SAML-based single sign-on for legacy system

Abstract: The Single Sign-On is used for users to solve the logging in and the passwords managing problems in different application systems. However, the traditional SSO system cannot provide an appropriate solution for legacy systems which are independent and hardly modifiable. In order to solve the problem, we present a new SSO method based on the SAML legacy System. In this paper, the structure of the new method is given, the communication protocol between users and identity provider is defined, and the security of t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 6 publications
(4 reference statements)
0
2
0
Order By: Relevance
“…There 3 phases that an SSO protocol need to be owned to provide a service of centralized authentication. The 3 phases generally operate on 3 roles that are end-user, Service Provider (SP) the so-called Information System, and Identity Provider (Idp) the so-called SSO [11], [15][16][17]. The first phase is to register and create trust establishment between SSO and the information system, phase 2 is a registration process users on the SSO, and the final phase is the users authenticating on the information via a token created by the SSO [11].…”
Section: System Designmentioning
confidence: 99%
“…There 3 phases that an SSO protocol need to be owned to provide a service of centralized authentication. The 3 phases generally operate on 3 roles that are end-user, Service Provider (SP) the so-called Information System, and Identity Provider (Idp) the so-called SSO [11], [15][16][17]. The first phase is to register and create trust establishment between SSO and the information system, phase 2 is a registration process users on the SSO, and the final phase is the users authenticating on the information via a token created by the SSO [11].…”
Section: System Designmentioning
confidence: 99%
“…For this reason, more and more cloud services providers are looking for an efficient authentication service, dubbed Authentication-asa-Service (AaaS), in order to enhance the security and to ease the handling of users authentication. Strong authentication can nowadays be ensured everywhere a password is used by employing industry standards such as RADIUS (Remote Authentication Dial-In User Service) and SAML [37](Security Assertion Markup Language) and API availability for other applications. The use of authentication token ("Cloud Token" [38] method) prevents the users from losing their token when migration from one platform to another is decided.…”
Section: -3 Rd Category: Security and Datamentioning
confidence: 99%