Single-Sign-On in your Identity & Acces Management System

Once logged in for all applications

The "Single-Sign-On" function is a central component of all IAM solutions. It not only leads to a uniform appearance and significant comfort gain, but is also A prerequisite for many further security mechanisms. The implementation of individual registration masks in each individual application is thus History.
Increase security
Save time when registering
Reduce development costs
Unique performance

How does the single-sign-on process work?

First registration

The user has not opened any application yet and has not yet logged in.

simplified representation; to prevent certain Attack scenarios are added in concrete implementations Safety precautions

  1. The user opens an application he wants to use.
  2. The application notes that it does not yet know to which user is. It automatically leads the user to Identity management system on.
  3. The user gives his access data in Identity management system. After successful login, the Identity management system to the user's browser a "device" for the application and send him back to application.
  4. The user's browser shows the ID in the application before, the application verified the ID and knows which user it is in the case of a third party. The user is now logged in to the application.

After the first application

When using the next application, the user no longer has to enter credentials.

  1. The user opens an application he wants to use.
  2. The application notes that it does not yet know to which user is. It automatically leads the user to Identity management system on.
  3. The identity management system already knows what Users. There is a "exit" to the user's browser for Application with and sends it back to application.
  4. The user's browser shows the ID in the application before, the application verified the ID and knows which user it is in the case of a third party. The user is now logged in to the application.

For this process no user interaction required!

More advantages of SSO in your IAM system

Safety advantages

No login details in the applications! A hacked application does not lead to that entire accounts are compromised.
Users are trained to be less susceptible to phishing
Improvements in the registration process affect all applications: Multi-factor authentication, WebAuthn, password policies etc.

Working hours, development costs & occurrence

Users save valuable working time when registering
Security improvements need only once in the identity management system to be configured. This saves development costs!
A uniform appearance is professional and improves identification with the company.
Contact us
We are happy to help
Frank Tripp Specialist in IAM
[email protected] +49 5251 5449490
Frank Tripp
free, online >
Make an appointment

We use cookies

We use cookies to provide you with the best possible experience on our website. Analysis tools help us to identify and improve the most popular content. We also want to find out how well our advertisements work. Details can be found in the Data Protection section. Please select which cookies you want to accept: