Skip to main content

JOSSO - Java Open Single Sign-On

What is Identity and Access Management?

IAM is a framework of policies and technologies for ensuring that the proper people in an enterprise have the appropriate access to technology resources. IdM systems fall under the overarching umbrella of IT security and Data Management . Identity and access management systems not only identify, authenticate and authorize individuals who will be utilizing IT resources, but also the hardware and applications employees need to access. Identity and Access Management solutions have become more prevalent and critical in recent years as regulatory compliance requirements have become increasingly more rigorous and complex. It addresses the need to ensure appropriate access to resources across increasingly heterogeneous technology environments and to meet increasingly rigorous compliance requirements


IAM covers issues such as how users gain an identity, the roles and, sometimes, the permissions that identity grants, the protection of that identity and the technologies supporting that protection (e.g., network protocols, digital certificates, passwords, etc.).

Reference:

About IAM - https://en.wikipedia.org/wiki/Identity_management


What is Single Sign-On?

Single sign-on (SSO) is a property of access control of multiple related, yet independent, software systems. With this property, a user logs in with a single ID and password to gain access to any of several related systems.

For clarity, it is best to refer to systems requiring authentication for each application but using the same credentials from a directory server as Directory Server Authentication and systems where a single authentication provides access to multiple applications by passing the authentication token seamlessly to configured applications as single sign-on.

Conversely, single sign-off is the property whereby a single action of signing out terminates access to multiple software systems.


As different applications and resources support different authentication mechanisms, single sign-on must internally store the credentials used for initial authentication and translate them to the credentials required for the different mechanisms.

An increasing number of federated social logons, like Facebook Connect do require the user to enter consent choices at first registration with a new resource and so are not always single sign-on in the strictest sense.

References:

1. About Single Sign-On - https://en.wikipedia.org/wiki/Single_sign-on

2. List of SSO Implementations - https://en.wikipedia.org/wiki/List_of_single_sign-on_implementations


What is JOSSO?

JOSSO is an open source Identity and Access Management (IAM) platform for rapid and standards-based Cloud-scale Single Sign-On, web services security, strong authentication and provisioning.

Reference:

JOSSO Official Site  - http://www.josso.org


Implementation Structure:






The following links will take you to installation and working with JOSSO.

1. Installation of JOSSO 

    Click here to know how to install JOSSO in your windows system

2. Working with JOSSO 

     There are three screens in JOSSO environment:

      (1) Creating & Modeling Appliance via Identity Appliance Modeler

      (2) Managing Users and Groups via Account and Entitlement Management

      (3) Building and Deploying Appliances via Identity Appliance Lifecycle Management

      
     Click to find  JOSSO Complete Documentation here

 

   


Comments