SlideShare a Scribd company logo
Federated Enterprise Single Sign-On
Architecture Design Pattern – Tier 1 Solution Building Block Version: 1.0 Author: Mike Reams Last Modified:
Design Pattern
Federated
Single Sign-On
(SSO)
A Design Pattern provides a scheme for refining the subsystems or components of a software system, or the relationships between them. It describes
commonly recurring structure of communicating components that solves a general design problem within a particular context . Architectural patterns are
similar to software design patterns but have a broader scope. The architectural patterns address various issues in software engineering, such as computer
hardware performance limitations, high availability and minimization of a business risk.
Federated SSO The Industry Standard is SAML 2.0 with Organizational Standard of assertions use SAML 2.0 Post Bindings. Supported use cases are (1) IdP
Initiated; (2) SP Initiated; (3)IdP Trusted; (4) SP Real-Time Registration;
Preference is to Sign both the SAML Assertion Request & Response. With PII data, entire xml must be encrypted end-to-end over the SOAP channel.
SP=Service Provider | IdP=Identity Provider
Architecture Domain(s) Identity Management | Security | Middleware
Web Server (SP)
Access
Manager
Access Policy
General Architecture
Assertion
Consumer Service
(ACS)
Service
Provider
Service Provider
Initiated (SP)
Web Service
Metadata
Exchange
Invokes IdPInvokes SP
Identity Provider
4. IdP posts SAML Response with 10 digit ID
SP Trusted
User
IdP Trusted
User
Guest
User
Service Provider
B. Certificate & URI exchange (Build Trust)
1. User invokes a Service Provider (SP) protected URL
2. SP sends user to IdP with SAML Redirect Post Request
3. User enters credentials on IdP Login page
1. User invokes IdP protected application
A. Identity Exchange
6. SP grants authorization Application
5b. SP trusted user is redirected with an IdM SAML assertion to access SP
3. User enters credentials on IdP Login page
2. IdP sends guest user to Login page (challenge URL)
Assertion Consumer
Service (ACS)
4. IdP posts SAML Request with a valid 10 digit ID
Application
6. IdP user is authorized w/ token to access SP
5a. SP trusted user is registered real-time if not found
5. IdP Creates token for On-Prem Access

More Related Content

PPT
Nistagmus
PPT
Api desgin
DOCX
Home automation System
PPSX
Busy-Business accounting software.
PDF
BC - Tal Wilkenfeld (Bass Transcription)
PDF
final project report_full edit
PPTX
Bionic eye
PPTX
Google lens
Nistagmus
Api desgin
Home automation System
Busy-Business accounting software.
BC - Tal Wilkenfeld (Bass Transcription)
final project report_full edit
Bionic eye
Google lens

Similar to Design Pattern for Federated Single Sign-On Access (20)

PDF
"Securing SSO Authentication: Strategies to eliminate vulnerabilities", Oleh ...
PPTX
IdP, SAML, OAuth
PDF
Cisco Connect Halifax 2018 cloud and on premises collaboration security exp...
PDF
Single Sign-On Best Practices
PDF
Taking a Pragmatic Look at the Salesforce Security Model
PPT
O2 Presentation Sdp Event
PPTX
Tech UG - Newcastle 09-17 - logic apps
PDF
Architecting Multi-Org Solutions
PDF
Single sign on using SAML
PPTX
Cisco SocialMiner Tools for Social Media Customer Care
PPTX
IAM/IRM CONSIDERATIONS FOR SAAS PROVIDER SELECTION
PDF
Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...
DOCX
Sindhumathi Vellaidurai
PPTX
Transforming a Large Mission-Critical E-Commerce Platform from a Relational A...
PPTX
CTU June 2011 - Windows Azure App Fabric
PDF
z/OS Connect - Overview at the "z Systems Agile Enterprise Development Confer...
PPTX
Sharksim Overview
PDF
Impact 2013 2971 - Fundamental integration and service patterns
DOCX
Syllabus for Technical courses
"Securing SSO Authentication: Strategies to eliminate vulnerabilities", Oleh ...
IdP, SAML, OAuth
Cisco Connect Halifax 2018 cloud and on premises collaboration security exp...
Single Sign-On Best Practices
Taking a Pragmatic Look at the Salesforce Security Model
O2 Presentation Sdp Event
Tech UG - Newcastle 09-17 - logic apps
Architecting Multi-Org Solutions
Single sign on using SAML
Cisco SocialMiner Tools for Social Media Customer Care
IAM/IRM CONSIDERATIONS FOR SAAS PROVIDER SELECTION
Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...
Sindhumathi Vellaidurai
Transforming a Large Mission-Critical E-Commerce Platform from a Relational A...
CTU June 2011 - Windows Azure App Fabric
z/OS Connect - Overview at the "z Systems Agile Enterprise Development Confer...
Sharksim Overview
Impact 2013 2971 - Fundamental integration and service patterns
Syllabus for Technical courses
Ad

More from Mike Reams (17)

PDF
Design Pattern Logical Model
PPTX
Knowledge Transfer Training Presentation for Identity Lifecycle Manager
PDF
Mobile user single sign on flow
PDF
Solution Delivery Calendar
PDF
Environment Gap Analysis for Applications
PDF
Perimeter Protected Access Design Pattern
PDF
Design Pattern for Oracle Identity Provisioning
PDF
Retiree Data Flow Diagram
PDF
Series of Visual Flow Diagrams
PDF
High-level Architecture viewpoint of a Troux Infrastructure
PDF
Visio Diagram of a user SSO Flow
PDF
Visio Diagram Scripting and Server Management flow
PDF
Visio Diagram for Configuration Management
PDF
User Flow swim-lane Diagram for New Hire
PDF
Architecture Design Presentation for OIM
PDF
Sample Template for Single Sign-On (SSO)
PDF
Visual representation as an architectural artifact
Design Pattern Logical Model
Knowledge Transfer Training Presentation for Identity Lifecycle Manager
Mobile user single sign on flow
Solution Delivery Calendar
Environment Gap Analysis for Applications
Perimeter Protected Access Design Pattern
Design Pattern for Oracle Identity Provisioning
Retiree Data Flow Diagram
Series of Visual Flow Diagrams
High-level Architecture viewpoint of a Troux Infrastructure
Visio Diagram of a user SSO Flow
Visio Diagram Scripting and Server Management flow
Visio Diagram for Configuration Management
User Flow swim-lane Diagram for New Hire
Architecture Design Presentation for OIM
Sample Template for Single Sign-On (SSO)
Visual representation as an architectural artifact
Ad

Recently uploaded (20)

PPT
Teaching material agriculture food technology
PDF
Electronic commerce courselecture one. Pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Approach and Philosophy of On baking technology
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Spectroscopy.pptx food analysis technology
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Empathic Computing: Creating Shared Understanding
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
cuic standard and advanced reporting.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Teaching material agriculture food technology
Electronic commerce courselecture one. Pdf
Review of recent advances in non-invasive hemoglobin estimation
The Rise and Fall of 3GPP – Time for a Sabbatical?
Approach and Philosophy of On baking technology
Encapsulation_ Review paper, used for researhc scholars
Spectroscopy.pptx food analysis technology
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Programs and apps: productivity, graphics, security and other tools
Advanced methodologies resolving dimensionality complications for autism neur...
NewMind AI Weekly Chronicles - August'25 Week I
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Empathic Computing: Creating Shared Understanding
“AI and Expert System Decision Support & Business Intelligence Systems”
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
cuic standard and advanced reporting.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx

Design Pattern for Federated Single Sign-On Access

  • 1. Federated Enterprise Single Sign-On Architecture Design Pattern – Tier 1 Solution Building Block Version: 1.0 Author: Mike Reams Last Modified: Design Pattern Federated Single Sign-On (SSO) A Design Pattern provides a scheme for refining the subsystems or components of a software system, or the relationships between them. It describes commonly recurring structure of communicating components that solves a general design problem within a particular context . Architectural patterns are similar to software design patterns but have a broader scope. The architectural patterns address various issues in software engineering, such as computer hardware performance limitations, high availability and minimization of a business risk. Federated SSO The Industry Standard is SAML 2.0 with Organizational Standard of assertions use SAML 2.0 Post Bindings. Supported use cases are (1) IdP Initiated; (2) SP Initiated; (3)IdP Trusted; (4) SP Real-Time Registration; Preference is to Sign both the SAML Assertion Request & Response. With PII data, entire xml must be encrypted end-to-end over the SOAP channel. SP=Service Provider | IdP=Identity Provider Architecture Domain(s) Identity Management | Security | Middleware Web Server (SP) Access Manager Access Policy General Architecture Assertion Consumer Service (ACS) Service Provider Service Provider Initiated (SP) Web Service Metadata Exchange Invokes IdPInvokes SP Identity Provider 4. IdP posts SAML Response with 10 digit ID SP Trusted User IdP Trusted User Guest User Service Provider B. Certificate & URI exchange (Build Trust) 1. User invokes a Service Provider (SP) protected URL 2. SP sends user to IdP with SAML Redirect Post Request 3. User enters credentials on IdP Login page 1. User invokes IdP protected application A. Identity Exchange 6. SP grants authorization Application 5b. SP trusted user is redirected with an IdM SAML assertion to access SP 3. User enters credentials on IdP Login page 2. IdP sends guest user to Login page (challenge URL) Assertion Consumer Service (ACS) 4. IdP posts SAML Request with a valid 10 digit ID Application 6. IdP user is authorized w/ token to access SP 5a. SP trusted user is registered real-time if not found 5. IdP Creates token for On-Prem Access