The reliance on unique usernames and passwords for every application is a common scenario that results in password fatigue and increased security risks. Single Sign-On (SSO) is the solution to this problem: a smart method that drastically simplifies the login process by granting access to multiple applications after just one login. This also benefits IT administrators and Chief Information Security Officers (CISO) in terms of management and compliance in information security. This article will dive deeper into how SSO works and the benefits it provides, and highlight how an Identity Access Management tool like Topicus KeyHub puts this technology into practice.
The principle behind SSO is relatively simple. A user logs into a central application, also known as an Identity Provider (IdP). This service verifies the user's identity. The user can then log into different target applications (Service Providers, or SPs) based on the previous login to the central application. The target applications redirect the user to the central application, which, after verification, sends the user back with the necessary information. This verification happens quickly and, if the user is already logged in, often goes unnoticed in the browser. This process is secure and reliable because all traffic runs over encrypted connections and the identification is digitally signed.
Several protocols support this process. The two most commonly used are SAML 2 (Security Assertion Markup Language) and OpenID Connect (OIDC), a variant of OAuth 2.0. Each has its own specifications, but the core functionality remains the same: one-time authentication for multiple services.
Successful SSO implementation requires a few key elements:
SSO offers benefits for both users and administrators. Users only need to remember one account and its login credentials, and typically only have to log in once per day, which significantly increases user-friendliness. For administrators, this means fewer forgotten passwords and less manual account management across different applications.
Additionally, SSO enhances security and efficiency. When an employee leaves the company or their rights change, their account only needs to be adjusted or disabled in the central application (the main application). This automatically revokes access to all target applications, making the chance of unintended active accounts nonexistent. Moreover, the central application gives security officers an overview of which users are logging into which target applications, which centralizes access monitoring.
There are various protocols to manage Single Sign-On (SSO). The three most common methods each serve a different purpose.
Topicus KeyHub is a Dutch Identity & Access Management (IAM) platform. Simply put, it helps organizations gain control over digital access and make information security demonstrable, which helps with audits and compliance.
The most common way Single Sign-On works is through the OIDC flow, with Topicus KeyHub acting as the central Identity Provider (IdP).
Topicus KeyHub serves as the central Identity Provider (IdP) in the SSO landscape. This means it is the primary source of truth for user identity. Instead of logging into each individual application, employees log into KeyHub once. This always happens with Two-Factor Authentication (2FA), which adds an extra layer of security to every connected application.
By integrating SSO with Topicus KeyHub, you, as an IT administrator and security officer, benefit from the following advantages:
The power of KeyHub's SSO functionality lies in the concept of group-based access. After a successful login to KeyHub, an employee's authorizations are not managed individually but are determined by the groups they belong to. This means that if an employee is a member of the "Financial Administration" group, they automatically get access to all applications linked to that group.
When an employee visits an application linked to KeyHub via SSO, the following process takes place:
This entire process is seamless and lightning-fast, thanks to the use of well-known protocols like SAML and OIDC.
Want to learn more about Single Sign-On? Feel free to contact us.