New single sign-on system cryptographic scheme completely hides your personal information - Innovation Toronto (2024)

New single sign-on system cryptographic scheme completely hides your personal information

Researchers develop cryptographic scheme that completely hides your personal information from third parties when using single sign-on systems.

Single sign-on systems (SSOs) allow us to login to multiple websites and applications using a single username and password combination. But these are third party systems usually handled by Big Tech companies who have been reported to gather and leak personal information without user consent. Now, researchers from Tokyo University of Science, Japan, have developed a new and secure single sign-on algorithm thateliminatesall these problems.

Over the last few decades, as the information era has matured, it has shaped the world of cryptography and made it a varied landscape. Amongst the myriad of encoding methods and cryptosystems currently available for ensuring secure data transfers and user identification, some have become quite popular because of their safety or practicality. For example, if you have ever been given the option to log onto a website using your Facebook or Gmail ID and password, you have encountered a single sign-on (SSO) system at work. The same goes for most smartphones, where signing in with a single username and password combination allows access to many different services and applications.

SSO schemes give users the option to access multiple systems by signing in to just one specific system. This specific system is called the “identity provider” and is regarded as a trusted entity that can verify and store the identity of the user. When the user attempts to access a service via the SSO, the “service provider” asks this identity provider to authenticate the user.

The advantages of SSO systems are many. For one, users need not remember several username and password combinations for each website or application. This translates into fewer people forgetting their passwords and, in turn, fewer telephone calls to IT support centers. Moreover, SSO reduces the hassle of logging in, which can, for example, encourage employees to use their company’s security-oriented tools for tasks such as secure file transfer.

But with these advantages come some grave concerns. SSO systems are often run by Big Tech companies, who have, in the past, been reported to gather people’s personal information from apps and websites (service providers) without their consent, for targeted advertising and other marketing purposes. Some people are also concerned that their ID and password could be stored locally by third parties when they provide them to the SSO mechanism.

In an effort to address these problems, Associate Professor Satoshi Iriyama from Tokyo University of Science and his colleague Dr Maki Kihara have recently developed a new SSO algorithm that on principle prevents such holistic information exchange. In their paper, published inCryptography, they describe the new algorithm in great detail after going over their motivations for developing it. Dr Iriyama states:“We aimed to develop an SSO algorithm that does not disclose the user’s identity and sensitive personal information to the service provider. In this way, our SSO algorithm uses personal information only for authentication of the user, as originally intended when SSO systems were introduced.”

Because of the way this SSO algorithm is designed, it is impossible in essence for user information to be disclosed without authorization. This is achieved, as explained by Dr Iriyama, by applying the principle of “handling information while it is still encrypted.” In their SSO algorithm, all parties exchange encrypted messages but never exchange decryption keys, and no one is ever in possession of all the pieces of the puzzle because no one has the keys to all the information. While the service provider (not the identity provider) gets to know whether a user was successfully authenticated, they do not get access to the user’s identity and any of their sensitive personal information. This in turn breaks the link that allows identity providers to draw specific user information from service providers.

The proposed scheme offers many other advantages. In terms of security, it is impervious by design to all typical forms of attack by which information or passwords are stolen. For instance, as Dr Iriyama explains,“Our algorithm can be used not only with an ID and a password, but also with any other type of identity information, such as biometrics, credit card data, and unique numbers known by the user.”This also means that users can only provide identity information that they wish to disclose, reducing the risk of Big Tech companies or other third parties siphoning off personal information. In addition, the algorithm runs remarkably fast, an essential quality to ensure that the computational burden does not hinder its implementation.

This study will hopefully bring about positive changes in current SSO systems, so that more users are encouraged to use them and reap their many benefits.

New single sign-on system cryptographic scheme completely hides your personal information - Innovation Toronto (2024)

FAQs

What is a single sign on SSO token? ›

What is Single Sign-On? Single sign-on (SSO) is an authentication method that enables users to securely authenticate with multiple applications and websites by using just one set of credentials.

How does the single sign-on enhance secure authentication? ›

Single-Sign On (SSO) describes an identity solution that allows multiple applications to use the same authentication session, so avoiding repetitive credential entry. SSO implementations are often adopted by companies in the enterprise world as part of their strategy to secure access to important resources.

What is the difference between same sign on and single sign on? ›

Single sign-on systems require a one-time authentication from the user. Once logged in, the user can access other web applications and services without re-authenticating themselves. Meanwhile, same sign-on requires the user to repeat the login process each time with the same authentication credentials.

What is a major risk of using single sign on SSO? ›

If a user successfully logs in via SSO and falls prey to a phishing attack, there is not always a simple solution. The attacker gets access to all the endpoints of the external applications within the cloud that the user is provisioned for. If the attack is detected, the user account can be disabled.

Is single sign on safe? ›

SSO security risks

Although single sign-on is a convenience to users, it presents risks to enterprise security. An attacker who gains control over a user's SSO credentials is granted access to every application the user has rights to, increasing the amount of potential damage.

What does single sign-on mean on a computer? ›

Single sign-on (SSO) is an identification method that enables users to log in to multiple applications and websites with one set of credentials. SSO streamlines the authentication process for users.

What is the difference between single sign-on and single sign out? ›

When users log in with SSO, the user identity is accessed by multiple applications. Without SLO, the user has to individually log out from every session they've signed into. With SLO, the user only needs to sign out of one service provider, and all the active sessions will be terminated without any additional effort.

Where is is single sign-on enabled? ›

To enable SSO:
  1. Lightning: Setup | Users | Profiles | Choose Profile Name | Look for "Is Single Sign-On Enabled" under Administrative Permissions section.
  2. Classic: Setup | Manage Users | Profiles | Choose Profile name | Look for "Is Single Sign-On Enabled" under Administrative Permissions section.
Sep 25, 2023

What are the risks of not using single sign on? ›

This can have a number of negative consequences, including: Loss of sensitive data: Without proper authentication measures in place, your business may be at risk of data breaches, which can result in the loss or theft of sensitive data such as customer or employee information.

What is the difference between SSO and password authentication? ›

In most cases, it makes sense to choose SSO over a password-based management solution. SSO is the modern approach. It reduces the dependency on passwords, enables customized access policies and expands interoperability. However, that doesn't mean that you should never consider password managers.

What is the benefit of single sign on? ›

Single sign-on increases employee productivity by reducing the time they must spend signing on and dealing with passwords. Users with just one password to access all of their apps can skip all that extra time spent logging in. SSO solutions often give them access to a dock where all their apps are available.

Can you disable single sign on? ›

To disable Enterprise Single Sign-On using the command line

At the command line prompt, go to the Enterprise Single Sign-On installation directory. The default installation directory is <drive>:\Program Files\Common Files\Enterprise Single Sign-On. Type ssomanage –disablesso.

What is the advantage and disadvantage of single sign on? ›

Disadvantages of Single Sign On (SSO):
SSO AdvantagesSingle Sign On Disadvantages
Reduces the load of memorising several passwords.When SSO fails, access to all related systems is lost.
Easy to implement and connect to new data sources.Increased risk of identity spoofing and phishing in user-external accesses.
1 more row

What protocol does SSO use? ›

There are several SSO protocols available, but the most commonly used ones are: OpenID Connect (OIDC) Security Assertion Markup Language (SAML) OAuth 2.0.

How do I find my SSO token? ›

Obtain an Access Token for SSO users
  1. Open POSTMAN and open a new tab to enter the API endpoint and body of the API that you want to call, if required. ...
  2. A new window with configured Idp's login opens. ...
  3. After a successful sign in, POSTMAN displays the access token in Manage Access Tokens, as shown below.
Jan 27, 2024

What is single sign-on SSO using SAML? ›

Security Assertion Markup Language, or SAML, is a standardized way to tell external applications and services that a user is who they say they are. SAML makes single sign-on (SSO) technology possible by providing a way to authenticate a user once and then communicate that authentication to multiple applications.

How long is a SSO token valid for? ›

Non-persistent session tokens have a Max Inactive Time of 24 hours whereas persistent session tokens have a Max Inactive Time of 90 days. Anytime the SSO session token is used within its validity period, the validity period is extended another 24 hours or 90 days.

Top Articles
Latest Posts
Article information

Author: Twana Towne Ret

Last Updated:

Views: 6172

Rating: 4.3 / 5 (44 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Twana Towne Ret

Birthday: 1994-03-19

Address: Apt. 990 97439 Corwin Motorway, Port Eliseoburgh, NM 99144-2618

Phone: +5958753152963

Job: National Specialist

Hobby: Kayaking, Photography, Skydiving, Embroidery, Leather crafting, Orienteering, Cooking

Introduction: My name is Twana Towne Ret, I am a famous, talented, joyous, perfect, powerful, inquisitive, lovely person who loves writing and wants to share my knowledge and understanding with you.