A single point of theoretical principles logged in (a)

First, what is the single sign-on?

The official explanation: single sign-on, referred to as SSO, it is one of the more popular enterprise business integration solutions. SSO is defined in multiple applications, users need only log in once to access all applications of mutual trust.

Popular understanding: "a" Login "everywhere" is available.

Example: a system service units A, B. In business processes, user needs to have landed A, perform certain operations after landing in the A-B system business operations. Times and landed too cumbersome, business leaders wanted to achieve "A user landing system, B system would not have landed, you can jump from A to B system to provide efficiency." Single sign-on can be achieved, without recording the user's password under the circumstances, the sharing of resources between multiple systems without logging in again.

Second, the advantages and disadvantages of single sign-on

advantage:

  1. Increase efficiency for users (user login times and no longer need, do not need to remember multiple ID and password. In addition, the user forgets the password and need the support staff will be reduced)
  2. Improving developer productivity (SSO provides developers with a common authentication framework. In fact, if the SSO mechanism is independent, so developers do not need to complete the authentication worry. They can assume, as long as the application request comes with a user name, identity verification has been completed)
  3. Simplified management (if the application to join the single sign-on protocol, the burden of managing user accounts will be reduced. Degree of simplification depends on the application, because only SSO authentication process. Therefore, the application may still need to set the user attributes (such as access privileges))

Disadvantages:

  1. Is not conducive to reconstruction (involving multiple systems to be reconstructed must be compatible with all systems, can be time consuming, post-upgrade should take into account)
  2. Unguarded Desktop (landing time, all systems can access, may lead to information leaks)

 

Guess you like

Origin www.cnblogs.com/wchwch/p/11285467.html