We are independent & ad-supported. We may earn a commission for purchases made through our links.
Advertiser Disclosure
Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.
How We Make Money
We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently of our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.
Security

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

What is Single Sign-On?

Malcolm Tatum
By
Updated: May 16, 2024
Views: 5,585
Share

Single sign-ons are access strategies that allow an end user to log on through a single round of entering credentials and have access to a range of different systems on the network without the need to enter additional credentials. This process is complimented with the use of what is known as the single sign-off, which allows the user to leave the network and end access to all the systems on the network until the next time the user chooses to log in.

This process of utilizing a single sign-on is only one example of different models for access control. The single sign-on or SSO does have some benefits. One common claim for the use of the single sign-on is that it is a time saver. The use of a single session for logging in saves time for end users who may need to access several systems in order to carry out work related tasks. By not having to take the time to log in to a different system each time there is a need to make momentary use of that system, tasks can be completed quickly and productivity can remain at a slightly higher rate.

At the same time, the single sign-on approach to access control does have a fair share of critics. While there is no doubt that the method helps to save time, it does present a greater security risk than with other approaches to access control. When there are no limits placed on where an end user can go among the systems, or no time limits imposed before the system queries for identification, the potential for illicit use of the systems becomes greater. For this reason, many companies do not use a single sign-on approach when it comes to systems that contain proprietary or highly confidential data. This is true even when only a few users are issued credentials to access the systems.

There are currently several different configurations for single sign-on protocols in use. The Kerberos based approach involves the process granting an end user a ticket when the login attempt is made, assuming the login credentials entered are recognized by the system. The OPT or One Time Password approach issues a token that allows the user to move freely among several systems. A third option, known as the Enterprise Single Sign-On or E-SSO essentially functions as an automatic password filler that provides the login data when the end user attempts to access a system without requiring the user to re-enter the login credentials.

Share
EasyTechJunkie is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.
Malcolm Tatum
By Malcolm Tatum
Malcolm Tatum, a former teleconferencing industry professional, followed his passion for trivia, research, and writing to become a full-time freelance writer. He has contributed articles to a variety of print and online publications, including EasyTechJunkie, and his work has also been featured in poetry collections, devotional anthologies, and newspapers. When not writing, Malcolm enjoys collecting vinyl records, following minor league baseball, and cycling.
Discussion Comments
Malcolm Tatum
Malcolm Tatum
Malcolm Tatum, a former teleconferencing industry professional, followed his passion for trivia, research, and writing...
Learn more
Share
https://www.easytechjunkie.com/what-is-single-sign-on.htm
Copy this link
EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.

EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.