single sign-on (sso) single sign-on (sso) strong authentication

21

Upload: virginia-denson

Post on 31-Mar-2015

344 views

Category:

Documents


12 download

TRANSCRIPT

Page 1: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication
Page 2: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication
Page 3: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication
Page 4: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication
Page 5: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication

Single Sign-On(SSO)

Page 6: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication

Single Sign-On(SSO)

Strong Authentication

Page 7: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication

Single Sign-On(SSO)

Strong Authentication

KNOW *******

Page 8: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication

Single Sign-On(SSO)

Strong Authentication

KNOW *******

HAVE

Page 9: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication

Single Sign-On(SSO)

Strong Authentication

KNOW *******

HAVE

ARE

Page 10: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication

Single Sign-On(SSO)

Strong Authentication

KNOW *******

HAVE

Page 11: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication

Single Sign-On(SSO)

Strong Authentication

KNOW *******

HAVE

Page 12: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication

Strong Mobile Authentication in Single Sign-On Systems

André [email protected]

Page 13: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication

Overview

• Objectives• Protocol arquitecture and description• Prototype overview• Demo• Conclusion

André [email protected]

Page 14: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication

Objectives

• Strong Authentication protocol for SSO systems using the mobile phone as a security token– Security, usability, flexibility, cost-efficiency

André [email protected]

• Implmentation prototype– Proof-of-concept– Usable strong authentication method using the

mobile phone as an alternative in SSO authentication

Page 15: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication

Protocol - Arquitecture

André [email protected]

Page 16: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication

Protocol - Arquitecture

André [email protected]

Page 17: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication

Protocol - Description

André [email protected]

Page 18: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication

Prototype - Overview

André [email protected]

Page 19: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication

Prototype - Demo

André [email protected]

Page 20: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication

Conclusion

André [email protected]

• SSO and strong authentication complement each other

• Mobile phone is a beneficial option as a security token and there are secure mechanisms that enhance it

• Protocol enables the creation of secure, usable, flexible and cost-efficient strong authentication methods

• Implementation prototype

Page 21: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication

André [email protected]

Questions?