Federated identity management (FIM) is an authentication scheme that links a user's identity across multiple security domains, each of which supports its own identity management system. When two domains are federated, the user can authenticate to one domain and then access resources in the other domain without having to perform a separate login process. Single sign-on (SSO) is an important component of identity federation, but it is not the same as identity federation. In order for FIM to be effective, the partners must have a sense of mutual trust. Authorization messages between partners in an FIM system can be transmitted using Security Assertion Markup Language (SAML) or a similar XML standard that enables a user to log on once for affiliated but separate websites or networks. Identity federation offers economic advantages, as well as convenience, to enterprises and their network subscribers. For example, multiple corporations can share a single application, resulting in cost-savings and consolidation of resources. Examples of FIM systems include OpenID and OAuth, as well as Shibboleth, which is based on OASIS SAML. How federated identity management works Under identity federation, the user authenticates once through the home domain; when that user initiates sessions in other partner security domains, those domains trust the user's home domain in order to authenticate the user. Here is how FIM works: - Users log in to their home network, authenticating through the home security domain.
- After they have authenticated to the home domain, users initiate an attempt to log in to a remote application that uses identity federation.
- Instead of authenticating directly with the remote application, that application requests the user's authentication from their home authentication server.
- The user's home authentication server authorizes the user to the remote application and the user is permitted to access the app.
The user only needs to authenticate once, to the home domain; remote apps in other security domains that have agreed to cooperate are then able to grant access to the user without requiring an additional login process. Continue reading... |
No comments:
Post a Comment