2013
DOI: 10.7251/jit1301027m
|View full text |Cite
|
Sign up to set email alerts
|

Using Kerberos protocol for Single Sign-On in Identity Management Systems

Abstract: Today, identity management systems are widely used in different types of organizations, from academic and government institutions to large enterprises. An important feature of identity management systems is the Single Sign-On functionality. Single Sign-On allows users to authenticate once, and freely use all services and resources available to them afterwards. In this paper, we present the usage of Kerberos in identity management systems. An overview of Kerberos protocol, state of the art of identity managemen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2016
2016

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 6 publications
(5 reference statements)
0
2
0
Order By: Relevance
“…(11)The application server conducts access control, connecting the database application system, transferring the access request to the database. The database server processes the request and returns operation results to the application server (12)The application server returns the result to the client browser. Figure 6 illustrates the system working process.…”
Section: System Implementationmentioning
confidence: 99%
“…(11)The application server conducts access control, connecting the database application system, transferring the access request to the database. The database server processes the request and returns operation results to the application server (12)The application server returns the result to the client browser. Figure 6 illustrates the system working process.…”
Section: System Implementationmentioning
confidence: 99%
“…Enterprise SSO relies on centralized directories services such as Microsoft Active Directory to which the enterprise's internal applications connect for user authentication. Although there are several flavors of enterprise SSO [8] (e.g., cache-based or password synchronization systems), authentication and directory technologies such as Kerberos and LDAP, respectively, are commonly used [11].…”
Section: Sso In the Enterprisementioning
confidence: 99%