What is Single Sign On (SSO)

Поделиться
HTML-код
  • Опубликовано: 8 сен 2024

Комментарии • 55

  • @I_Unintentionally_Morph
    @I_Unintentionally_Morph Год назад +2

    I am enjoying this channel every time

  • @megayndx
    @megayndx Год назад +8

    Good solution but it has a flaw. It's better for hackers to steal SSO of many users and get access to their services throw attacking single SSO. However all says that SSO is highly protected and blah-blah but it will be cheaper to find vulnerabilities and attack a single service instead of a couple ones. Like it was with lastpass.

    • @jeffcrume
      @jeffcrume Год назад +6

      No solution fixes all problems in security. The goal can't be perfection or we will always fail. The goal has to be to continue to make the system more secure. Absolute secure doesn't exist with an operational system. The question should be, is it more secure as a result?

    • @ClaudioBOsorio
      @ClaudioBOsorio Год назад

      LastPass is server dependent. Something like Enpass allows you to have the encrypted SSO that you can store anywhere you like. If hackers get to it it's because you misplaced your password manager file

    • @CenturionKenshin
      @CenturionKenshin Год назад +2

      @@jeffcrume In my opinion, in security - damage control is more important, including the limitation of attack spread. Everything that has access, doesnt matter how secure will be broken at some time. So I think it is more important detect it in time and limit the damage than building the walls.

    • @jeffcrume
      @jeffcrume Год назад +1

      @@CenturionKenshin which is why MFA can help here. If implemented well, it would be very hard for an attacker to get all credentials if they have to defeat a strong authentication solution first

  • @God1293
    @God1293 Год назад +4

    Short and precise ❤

  • @Mari_Selalu_Berbuat_Kebaikan
    @Mari_Selalu_Berbuat_Kebaikan Год назад +3

    Let's always do good 🙏

  • @SahadFoundation
    @SahadFoundation Год назад +2

    This is so informative. Thank you for making this video.

    • @jeffcrume
      @jeffcrume 6 месяцев назад

      Thanks for watching!

  • @tiamaria4738
    @tiamaria4738 Год назад +6

    Isn't single point of failure more related to availablity. What if the SSO application goes down or is not accessible?

    • @jeffcrume
      @jeffcrume Год назад +2

      There can be different kinds of failures -- availability is certainly one type. A well architected SSO solution would have failover capabilities so it has no single point of failure from an availability standpoint as well

  • @davidearthos6453
    @davidearthos6453 Год назад +1

    Good work.. we're getting there step by step..

  • @shwe2u
    @shwe2u Год назад +1

    Wow ..this is awesome .
    Sir ,i have completed my course on cyber security law ..it's so interesting...hope i will get a job soon so that i can explore and learn more about it and contribute positively to securing the cyber space ..

    • @jeffcrume
      @jeffcrume Год назад

      Best of luck to you Nair!

  • @anilbangera1
    @anilbangera1 Год назад +4

    Worth it... Bravo 👏

  • @elijahlair
    @elijahlair 3 месяца назад

    Wow! This is so good! Perfectly explained

  • @jamesa4958
    @jamesa4958 Год назад +1

    This was very helpful and well explained. Thank you!

  • @medsalemdeddah8853
    @medsalemdeddah8853 5 месяцев назад

    Beautifully explained

  • @cognizant2010
    @cognizant2010 10 месяцев назад +1

    Thank you sir

  • @mms2896
    @mms2896 8 месяцев назад +1

    Isn;t this identity federation? I thought the SSO is the contract between the client (browser) and the IDP so that if different systems use the same identity provider for authentication, they can login without explicitly authenticated.

    • @jeffcrume
      @jeffcrume 6 месяцев назад

      That’s certainly one way to do it and the most common one when you are crossing identity domains that you don’t directly control. However, there can be SSO within an org across its various sites as well that may not require federation protocols

  • @suikast420
    @suikast420 Год назад +2

    What about keypass?

  • @ukaszkiepas57
    @ukaszkiepas57 4 месяца назад

    thank you ! :)

  • @IndianDesiTennis
    @IndianDesiTennis Год назад +2

    nice explanation

  • @shirley6020
    @shirley6020 2 месяца назад

    So this is safe then, right.is that when you get google mixed numbers letters.! I have concussion why at hospital. Tts bad dr said.

  • @YavorMarinov-rt9xc
    @YavorMarinov-rt9xc Год назад +1

    P1=P2=Pn, and what will make the user not do PA=P1=Pn ..., but PA != P1 != Pn in the SSO case ?

    • @jeffcrume
      @jeffcrume Год назад +3

      They could but why would they? The SSO system could actually set different pw’s for each system automatically so it would actually require more effort for them to override this and result in lower security and no apparent benefit

    • @Terabyte1244
      @Terabyte1244 9 месяцев назад

      @@jeffcrume Hi, but wouldn't the PA password provide access to all three systems anyhow? If they have the PW to SSO, surely the access to all systems will be given? Won't the systems assume that the user is who they are because they have password PA?

  • @Buzzle420
    @Buzzle420 Год назад +1

    Please..... Please... Please

  • @CenturionKenshin
    @CenturionKenshin Год назад +1

    SPoF here is the guy with the smile :) and always will be. SSO makes it easier to get one password to rule it all and MFA would not help, if guy_with_the_smile's butt is on fire :)

    • @shapshooter7769
      @shapshooter7769 Год назад +3

      SSO is supposed to be coupled with permissions. That way the higher the privilege of a given account, the stricter the protocol needed to use that account.

    • @jeffcrume
      @jeffcrume Год назад +3

      Humans are usually the weakest link, for sure, but with well implemented MFA and other controls, you lessen the likelihood that the user is compromised or, inadvertently contributes to the compromise. A malicious user intent on harm is a different matter. This is where oversight with things like User Behavior Analytics can help

    • @CenturionKenshin
      @CenturionKenshin Год назад

      @@jeffcrume I just like to get to/put to extreme in/for hypothetical situations. User Behaviour Analytics can help to some degree indeed but in this case we might probably would talk about damage control.

    • @CenturionKenshin
      @CenturionKenshin Год назад

      @@shapshooter7769 PAM is good, but again if entry point is the user(I'm not talking user doing it willingly), one can not do anything even with PAM.

  • @GuruChaz
    @GuruChaz Год назад +1

    I swear we have a lady that calls in almost every 3-4 days that she has forgot her main Windows login password. How is that even possible? Are people really that stupid?

    • @jeffcrume
      @jeffcrume Год назад

      I think you answered your own question 😂

  • @messizhao3813
    @messizhao3813 Год назад +5

    Does anyone watch this video just to learn english like me?

    • @jeffcrume
      @jeffcrume Год назад +1

      I hoping it is helping you in that regard as well, although, my English is not always the best. Just ask my high school Grammar teacher ... 😂

    • @GuruGulabKhatri973
      @GuruGulabKhatri973 10 месяцев назад

      No

  • @LSM-10tex
    @LSM-10tex Год назад

    Isn't SSO like his third example. The SSO password gets compromised, it will provide access to the rest.

    • @jeffcrume
      @jeffcrume Год назад +3

      That’s why you should use multi-factor authentication to get into the SSO system. That way the compromise of a single password doesn’t result in compromise of the whole system

    • @rahuljayekar2685
      @rahuljayekar2685 11 месяцев назад

      @@jeffcrume Yes but then we can use MFA in first case as well correct? Use same password for all the systems with MFA. We're back to square one. How do you respond to this question?

    • @Alex7nt
      @Alex7nt 10 месяцев назад

      @@rahuljayekar2685 without SSO, u will need log-in in all webs independently

  • @dmatviychuk
    @dmatviychuk Год назад

    SPoF is when sso stopped working, not when someone figured user’s password.

    • @jeffcrume
      @jeffcrume Год назад +1

      Failure comes in many forms. Failure of the system to be available, failure of the system to produce the intended results, failure to complete a task in a reasonable time or failure to keep information secure are just a few examples

  • @andregomesdasilva
    @andregomesdasilva Год назад

    I don't considera myself a super smart person, but sometimes I can't understand why people can't figure our some very simple solutions.
    Just create a sead with about 6 to 8 characters like j%7&=83. Now, of you need to create an account in Google, take the first 2 and last 2 letters, and glue them to your seed: GOj%7&=83LE. Of you are creating ot in Yahoo, then YAj%7&=83OO.
    There. You have virtually one password per website and you just need to remember one thing (the seed). No need for vault, no need for SSO.
    Why this is not obvious to everyone is beyond me.

    • @walterclementsjr.5947
      @walterclementsjr.5947 Год назад +3

      what if you need to change 1 password? you break your formula. "oh that's fine I'll make another one." how do you keep track of all the new 20 formulas? you write them down. again. use a vault for god's sake.

    • @carlosmccrary9036
      @carlosmccrary9036 Год назад

      Because if someone discovers that seed and the method of creating passwords then they’ll just recreate that process when attempting to log into these other accounts.

    • @jeffcrume
      @jeffcrume Год назад +4

      The problem is that if anyone sees one or two of these passwords, the formula is pretty easily determined and, therefore, can be extrapolated to other systems. This might be an option for very low security systems where the cost of compromise is negligible, but insufficient for really sensitive stuff.

  • @dumchikdum7967
    @dumchikdum7967 Год назад +2

    Password manager solves this, Bitwarden solves this. Wasted my time

    • @dumchikdum7967
      @dumchikdum7967 Год назад

      + it's e2e encrypted, bitwarden for the win

  • @tyrojames9937
    @tyrojames9937 Год назад

    SSO is NO Longer SAFE! HELL, WHAT IS?🤔🤔

    • @jeffcrume
      @jeffcrume Год назад

      There is no such thing as absolute security on any system that is operational. It's always a question of risk analysis, which was the subject of this video ... ruclips.net/video/xt_Cdtvjbd4/видео.html