Survey on approaches to secure SSO mechanism

Authors

  • Nidhi Thacker Department of Computer Engineering, PIET, Vadodara
  • Prof. Gordhan B. Jethava Department of Information & Technology, PIET, Vadodara

Keywords:

Single Sign-On, XSS, OpenID, SAML, MTM, Relying Party

Abstract

Internet and web applications have grown exponentially and have become an essential part of day-to-day
living. But level of security that this Internet provides has not grown as fast as the Internet applications. As web
applications become more and more widespread, users must handle an increasing number of authentication credentials to
establish security contexts with web applications. Single Sign-On Mechanism is the most popular authentication
mechanism and is used by most of companies now a days. There are many single sign-on protocols available for
implementing it. These single sign-on protocols suffer from an authentication flaw that allows a malicious service provider
to impersonate the user. In this survey paper, these types of attacks on single sign-on are explained and also approaches to
prevent these attacks are explained with advantages, disadvantages and future scope.

Published

2016-01-25

How to Cite

Survey on approaches to secure SSO mechanism. (2016). International Journal of Advance Engineering and Research Development (IJAERD), 3(1), 269-275. https://www.ijaerd.org/index.php/IJAERD/article/view/1644

Similar Articles

11-20 of 880

You may also start an advanced similarity search for this article.