single sign-on (sso) single sign-on (sso) strong authentication
TRANSCRIPT
![Page 1: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication](https://reader035.vdocuments.site/reader035/viewer/2022081416/5519d6835503468b0c8b49c3/html5/thumbnails/1.jpg)
![Page 2: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication](https://reader035.vdocuments.site/reader035/viewer/2022081416/5519d6835503468b0c8b49c3/html5/thumbnails/2.jpg)
![Page 3: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication](https://reader035.vdocuments.site/reader035/viewer/2022081416/5519d6835503468b0c8b49c3/html5/thumbnails/3.jpg)
![Page 4: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication](https://reader035.vdocuments.site/reader035/viewer/2022081416/5519d6835503468b0c8b49c3/html5/thumbnails/4.jpg)
![Page 5: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication](https://reader035.vdocuments.site/reader035/viewer/2022081416/5519d6835503468b0c8b49c3/html5/thumbnails/5.jpg)
Single Sign-On(SSO)
![Page 6: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication](https://reader035.vdocuments.site/reader035/viewer/2022081416/5519d6835503468b0c8b49c3/html5/thumbnails/6.jpg)
Single Sign-On(SSO)
Strong Authentication
![Page 7: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication](https://reader035.vdocuments.site/reader035/viewer/2022081416/5519d6835503468b0c8b49c3/html5/thumbnails/7.jpg)
Single Sign-On(SSO)
Strong Authentication
KNOW *******
![Page 8: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication](https://reader035.vdocuments.site/reader035/viewer/2022081416/5519d6835503468b0c8b49c3/html5/thumbnails/8.jpg)
Single Sign-On(SSO)
Strong Authentication
KNOW *******
HAVE
![Page 9: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication](https://reader035.vdocuments.site/reader035/viewer/2022081416/5519d6835503468b0c8b49c3/html5/thumbnails/9.jpg)
Single Sign-On(SSO)
Strong Authentication
KNOW *******
HAVE
ARE
![Page 10: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication](https://reader035.vdocuments.site/reader035/viewer/2022081416/5519d6835503468b0c8b49c3/html5/thumbnails/10.jpg)
Single Sign-On(SSO)
Strong Authentication
KNOW *******
HAVE
![Page 11: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication](https://reader035.vdocuments.site/reader035/viewer/2022081416/5519d6835503468b0c8b49c3/html5/thumbnails/11.jpg)
Single Sign-On(SSO)
Strong Authentication
KNOW *******
HAVE
![Page 13: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication](https://reader035.vdocuments.site/reader035/viewer/2022081416/5519d6835503468b0c8b49c3/html5/thumbnails/13.jpg)
Overview
• Objectives• Protocol arquitecture and description• Prototype overview• Demo• Conclusion
André [email protected]
![Page 14: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication](https://reader035.vdocuments.site/reader035/viewer/2022081416/5519d6835503468b0c8b49c3/html5/thumbnails/14.jpg)
Objectives
• Strong Authentication protocol for SSO systems using the mobile phone as a security token– Security, usability, flexibility, cost-efficiency
André [email protected]
• Implmentation prototype– Proof-of-concept– Usable strong authentication method using the
mobile phone as an alternative in SSO authentication
![Page 20: Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication](https://reader035.vdocuments.site/reader035/viewer/2022081416/5519d6835503468b0c8b49c3/html5/thumbnails/20.jpg)
Conclusion
André [email protected]
• SSO and strong authentication complement each other
• Mobile phone is a beneficial option as a security token and there are secure mechanisms that enhance it
• Protocol enables the creation of secure, usable, flexible and cost-efficient strong authentication methods
• Implementation prototype