What is Single Sign On (SSO)

Поделиться
HTML-код
  • Опубликовано: 29 дек 2024

Комментарии • 58

  • @I_Unintentionally_Morph
    @I_Unintentionally_Morph 2 года назад +5

    I am enjoying this channel every time

  • @tiamaria4738
    @tiamaria4738 2 года назад +7

    Isn't single point of failure more related to availablity. What if the SSO application goes down or is not accessible?

    • @jeffcrume
      @jeffcrume 2 года назад +3

      There can be different kinds of failures -- availability is certainly one type. A well architected SSO solution would have failover capabilities so it has no single point of failure from an availability standpoint as well

  • @God1293
    @God1293 2 года назад +4

    Short and precise ❤

  • @SahadFoundation
    @SahadFoundation Год назад +4

    This is so informative. Thank you for making this video.

    • @jeffcrume
      @jeffcrume 10 месяцев назад

      Thanks for watching!

  • @megayndx
    @megayndx 2 года назад +9

    Good solution but it has a flaw. It's better for hackers to steal SSO of many users and get access to their services throw attacking single SSO. However all says that SSO is highly protected and blah-blah but it will be cheaper to find vulnerabilities and attack a single service instead of a couple ones. Like it was with lastpass.

    • @jeffcrume
      @jeffcrume 2 года назад +6

      No solution fixes all problems in security. The goal can't be perfection or we will always fail. The goal has to be to continue to make the system more secure. Absolute secure doesn't exist with an operational system. The question should be, is it more secure as a result?

    • @ClaudioBOsorio
      @ClaudioBOsorio 2 года назад

      LastPass is server dependent. Something like Enpass allows you to have the encrypted SSO that you can store anywhere you like. If hackers get to it it's because you misplaced your password manager file

    • @CenturionKenshin
      @CenturionKenshin 2 года назад +2

      @@jeffcrume In my opinion, in security - damage control is more important, including the limitation of attack spread. Everything that has access, doesnt matter how secure will be broken at some time. So I think it is more important detect it in time and limit the damage than building the walls.

    • @jeffcrume
      @jeffcrume 2 года назад +1

      @@CenturionKenshin which is why MFA can help here. If implemented well, it would be very hard for an attacker to get all credentials if they have to defeat a strong authentication solution first

  • @davidearthos6453
    @davidearthos6453 2 года назад +1

    Good work.. we're getting there step by step..

  • @elijahlair
    @elijahlair 6 месяцев назад

    Wow! This is so good! Perfectly explained

  • @jamesa4958
    @jamesa4958 Год назад +1

    This was very helpful and well explained. Thank you!

  • @anilbangera1
    @anilbangera1 2 года назад +5

    Worth it... Bravo 👏

  • @shwe2u
    @shwe2u Год назад +1

    Wow ..this is awesome .
    Sir ,i have completed my course on cyber security law ..it's so interesting...hope i will get a job soon so that i can explore and learn more about it and contribute positively to securing the cyber space ..

    • @jeffcrume
      @jeffcrume Год назад

      Best of luck to you Nair!

  • @medsalemdeddah8853
    @medsalemdeddah8853 9 месяцев назад

    Beautifully explained

  • @mms2896
    @mms2896 Год назад +1

    Isn;t this identity federation? I thought the SSO is the contract between the client (browser) and the IDP so that if different systems use the same identity provider for authentication, they can login without explicitly authenticated.

    • @jeffcrume
      @jeffcrume 10 месяцев назад

      That’s certainly one way to do it and the most common one when you are crossing identity domains that you don’t directly control. However, there can be SSO within an org across its various sites as well that may not require federation protocols

  • @suikast420
    @suikast420 2 года назад +2

    What about keypass?

  • @YavorMarinov-rt9xc
    @YavorMarinov-rt9xc Год назад +1

    P1=P2=Pn, and what will make the user not do PA=P1=Pn ..., but PA != P1 != Pn in the SSO case ?

    • @jeffcrume
      @jeffcrume Год назад +4

      They could but why would they? The SSO system could actually set different pw’s for each system automatically so it would actually require more effort for them to override this and result in lower security and no apparent benefit

    • @Terabyte1244
      @Terabyte1244 Год назад

      @@jeffcrume Hi, but wouldn't the PA password provide access to all three systems anyhow? If they have the PW to SSO, surely the access to all systems will be given? Won't the systems assume that the user is who they are because they have password PA?

    • @AjaySingh-ey7gt
      @AjaySingh-ey7gt Месяц назад

      @@jeffcrume Thank you Sir

  • @shirley6020
    @shirley6020 5 месяцев назад

    So this is safe then, right.is that when you get google mixed numbers letters.! I have concussion why at hospital. Tts bad dr said.

  • @IndianDesiTennis
    @IndianDesiTennis 2 года назад +2

    nice explanation

  • @cognizant2010
    @cognizant2010 Год назад +1

    Thank you sir

  • @Jhfhfghdghb
    @Jhfhfghdghb 3 месяца назад

    Thank you

  • @ukaszkiepas57
    @ukaszkiepas57 8 месяцев назад

    thank you ! :)

  • @CenturionKenshin
    @CenturionKenshin 2 года назад +1

    SPoF here is the guy with the smile :) and always will be. SSO makes it easier to get one password to rule it all and MFA would not help, if guy_with_the_smile's butt is on fire :)

    • @shapshooter7769
      @shapshooter7769 2 года назад +3

      SSO is supposed to be coupled with permissions. That way the higher the privilege of a given account, the stricter the protocol needed to use that account.

    • @jeffcrume
      @jeffcrume 2 года назад +3

      Humans are usually the weakest link, for sure, but with well implemented MFA and other controls, you lessen the likelihood that the user is compromised or, inadvertently contributes to the compromise. A malicious user intent on harm is a different matter. This is where oversight with things like User Behavior Analytics can help

    • @CenturionKenshin
      @CenturionKenshin 2 года назад

      @@jeffcrume I just like to get to/put to extreme in/for hypothetical situations. User Behaviour Analytics can help to some degree indeed but in this case we might probably would talk about damage control.

    • @CenturionKenshin
      @CenturionKenshin 2 года назад

      @@shapshooter7769 PAM is good, but again if entry point is the user(I'm not talking user doing it willingly), one can not do anything even with PAM.

  • @Mari_Selalu_Berbuat_Kebaikan
    @Mari_Selalu_Berbuat_Kebaikan 2 года назад +3

    Let's always do good 🙏

  • @LSM-10tex
    @LSM-10tex 2 года назад

    Isn't SSO like his third example. The SSO password gets compromised, it will provide access to the rest.

    • @jeffcrume
      @jeffcrume Год назад +3

      That’s why you should use multi-factor authentication to get into the SSO system. That way the compromise of a single password doesn’t result in compromise of the whole system

    • @rahuljayekar2685
      @rahuljayekar2685 Год назад

      @@jeffcrume Yes but then we can use MFA in first case as well correct? Use same password for all the systems with MFA. We're back to square one. How do you respond to this question?

    • @PolkadOfficial
      @PolkadOfficial Год назад

      @@rahuljayekar2685 without SSO, u will need log-in in all webs independently

  • @Buzzle420
    @Buzzle420 Год назад +1

    Please..... Please... Please

  • @GuruChaz
    @GuruChaz Год назад +1

    I swear we have a lady that calls in almost every 3-4 days that she has forgot her main Windows login password. How is that even possible? Are people really that stupid?

    • @jeffcrume
      @jeffcrume Год назад

      I think you answered your own question 😂

  • @andregomesdasilva
    @andregomesdasilva 2 года назад

    I don't considera myself a super smart person, but sometimes I can't understand why people can't figure our some very simple solutions.
    Just create a sead with about 6 to 8 characters like j%7&=83. Now, of you need to create an account in Google, take the first 2 and last 2 letters, and glue them to your seed: GOj%7&=83LE. Of you are creating ot in Yahoo, then YAj%7&=83OO.
    There. You have virtually one password per website and you just need to remember one thing (the seed). No need for vault, no need for SSO.
    Why this is not obvious to everyone is beyond me.

    • @walterclementsjr.5947
      @walterclementsjr.5947 2 года назад +3

      what if you need to change 1 password? you break your formula. "oh that's fine I'll make another one." how do you keep track of all the new 20 formulas? you write them down. again. use a vault for god's sake.

    • @carlosmccrary9036
      @carlosmccrary9036 2 года назад

      Because if someone discovers that seed and the method of creating passwords then they’ll just recreate that process when attempting to log into these other accounts.

    • @jeffcrume
      @jeffcrume 2 года назад +4

      The problem is that if anyone sees one or two of these passwords, the formula is pretty easily determined and, therefore, can be extrapolated to other systems. This might be an option for very low security systems where the cost of compromise is negligible, but insufficient for really sensitive stuff.

  • @dmatviychuk
    @dmatviychuk 2 года назад

    SPoF is when sso stopped working, not when someone figured user’s password.

    • @jeffcrume
      @jeffcrume Год назад +1

      Failure comes in many forms. Failure of the system to be available, failure of the system to produce the intended results, failure to complete a task in a reasonable time or failure to keep information secure are just a few examples

  • @messizhao3813
    @messizhao3813 2 года назад +7

    Does anyone watch this video just to learn english like me?

    • @jeffcrume
      @jeffcrume 2 года назад +1

      I hoping it is helping you in that regard as well, although, my English is not always the best. Just ask my high school Grammar teacher ... 😂

    • @GuruGulabKhatri973
      @GuruGulabKhatri973 Год назад

      No

  • @dumchikdum7967
    @dumchikdum7967 2 года назад +2

    Password manager solves this, Bitwarden solves this. Wasted my time

    • @dumchikdum7967
      @dumchikdum7967 2 года назад

      + it's e2e encrypted, bitwarden for the win

  • @tyrojames9937
    @tyrojames9937 2 года назад

    SSO is NO Longer SAFE! HELL, WHAT IS?🤔🤔

    • @jeffcrume
      @jeffcrume 2 года назад

      There is no such thing as absolute security on any system that is operational. It's always a question of risk analysis, which was the subject of this video ... ruclips.net/video/xt_Cdtvjbd4/видео.html