Federated Identity Management - We Built It; Why Won't They Come?

Abstract

M any companies take advantage of single-sign-on (SSO) technologies. After a successful login, the authentication service sends the computer a security token, which is subsequently forwarded as proof of authentication each time that computer accesses a protected service. Examples of services linked through SSO include access to network drives, email… (More)
DOI: 10.1109/MSP.2012.135

1 Figure or Table

Topics

  • Presentations referencing similar topics