scholarly journals Using Kerberos protocol for Single Sign-On in Identity Management Systems

Author(s):  
Ivan Milenković ◽  
Olja Latinović ◽  
Dejan Simić

Abstract: Today, identity management systems are widely used in different types of organizations, from academic and government institutions to large enterprises. An important feature of identity management systems is the Single Sign-On functionality. Single Sign-On allows users to authenticate once, and freely use all services and resources available to them afterwards. In this paper, we present the usage of Kerberos in identity management systems. An overview of Kerberos protocol, state of the art of identity management systems and different generic architectures for identity management is given in the paper. Also, we present a Single Sign-On identity management architecture proposal based on Kerberos protocol, and discuss its properties. Special attention was given to authentication, authorization and auditing.

Author(s):  
Claudio Agostino Ardagna ◽  
Marco Cremonini ◽  
Ernesto Damiani ◽  
Sabrina De Capitani di Vimercati ◽  
Fulvio Frati ◽  
...  

This chapter introduces the concept of privacy-enhanced identity management for e-services supporting the users needs to protect their privacy and sensitive information. Business activities are increasingly based on the use of remote resources and e-services as well as on the interaction between different, remotely-located, parties. In this context, the electronic execution of private and/or sensitive transactions must fully preserve information privacy by managing in a trustworthy and responsible way all identity and profile information that is released to remote parties. In this chapter, we investigate the main problems concerning identity management for e-services and outline the features that the next-generation of identity management systems should provide for. State-of-the-art technology in the field of privacy-enhanced identity management systems is also compared with traditional Public Key Infrastructure (PKI) solutions. The analysis of the benefits of these modern identity management systems is presented and discussed with references also to the results of some experiences in the area of e-government, whose objective is the development of public administration privacy-aware e-services.


2020 ◽  
Vol 4 (5) ◽  
pp. 19-40
Author(s):  
Omar Dib ◽  
Khalifa Toumi

Due to the exponential rise of the Internet in the last two decades, the digital presence has seen an enormous increase. Today, billions of people, devices and objects are digitally connected making the interactions much easier than before. To securely establish this connectivity in the digital era, proving digital identities has become crucial. Due to this, a growing number of organizations are building solutions that establish, verify and manage digital identities. Yet, a solution whereby digital identities and their associated data are efficiently managed is still far from being achieved. To fully understand the reason behind this lack, this paper provides a detailed state of the art related to identity management systems. It overviews traditional systems, analyses their strengths and limitations. This work highly focuses on the novel decentralized identity systems based on blockchain; a complete study describing their architecture, components, lifecycle and workflow is detailed. Additionally, solutions enabling decentralized identity are discussed, analysed and compared according to the ten principles of self-sovereign identity. Lastly, the challenges hindering the shift toward the fully decentralized identity paradigm are discussed.


Author(s):  
Daisuke Mashima ◽  
David Bauer ◽  
Mustaque Ahamad ◽  
Douglas M. Blough

The pervasive use of digital identities in today’s cyberspace has led to an increasing interest in the area of identity management. Recently proposed user-centric identity management systems have accomplished higher-level of user control over online identity credentials. However, while the lack of a central authority that governs the entire system requires users to be responsible for their own digital identity credentials, the existing user-centric identity management systems still have problems in terms of security, privacy, and system availability. In this chapter, we present an identity management architecture that addresses these problems. Our scheme relies on user-controlled identity agents. Identity agents realize fine-grained control over online identity disclosure by using a minimal-disclosure identity credential scheme and also improve users’ awareness over their credential usage via an identity-usage monitoring system that includes a real-time risk scoring mechanism. A proof-of-concept implementation is shown and evaluated in terms of security, user-centricity, and performance.


Sign in / Sign up

Export Citation Format

Share Document