菜单

知名ELX570P厂商的SSO单点登录解决方案介绍一

2019年2月25日 - 一点资讯

      SSO英文全称Single Sign
On,单点登录。SSO是在几个应用系统中,用户只供给报到二回就足以访问具有相互信任的施用系统。它包含能够将本次珍视的记名映射到别的使用中用于同一个用户的报到的机制。认证系统的显要效用是将用户的登录新闻和用户音讯库绝相比,对用户进行登录认证;认证成功后,认证种类应该转变统一的说明标志(ticket),返还给用户。它是相比较流行的集团工作重组的缓解方案之一。
      集团应用集成(EAI, Enterprise Application
Integration)。集团应用集成能够在差别范畴上拓展:例如在数量存款和储蓄层面上的“数据大汇总”,在传输层面上的“通用数据沟通平台”,在运用范围上的“业务流程整合”,和用户界面上的“通用公司门户”等等。事实上,还有一个规模上的合一变得尤为重要,这就是“身份验证”的结缘,也正是“单点登录。
      在音讯安全治本中,访问控制(Access
Controls)环绕八个经过:Identification;Authentication;Authorization;Accountability。单点登录(Single
Sign On)属于Authorization授权系统,除单点登录外还包涵:Lightweight
Directory Access Protocol 和 Authorization ticket。

咱俩介绍一下 SAP SSO Single Sign-On 单点登录

SAP portfolio

图片 1

SAP Single Sign-On provides simple, secure access to IT applications for
business users. It offers advanced security
capabilities to protect your company data and business applications.

Simple and secure access
Ÿ Single sign-on for native SAP clients and web applications
Ÿ Single sign-on for mobile devices
Ÿ Support for cloud and on-premise landscapes
Secure data communication Ÿ Encryption of data communication for SAP GUI
Ÿ Digital signatures
Ÿ FIPS 140-2 certification of security functions
Advanced security capabilities
Ÿ Two-factor authentication
Ÿ Risk-based authentication using access policies
Ÿ RFID-based authentication
Ÿ Hardware security module support

 

Two-Factor Authentication

With two-factor authentication you can implement a strong form of
authentication for access to corporate resources – for example, for
especially critical systems or securing access from outside the company.
SAP Single Sign-On 2.0 supports two-factor authentication via time-based
one-time passwords (TOTP) generated by the SAP Authenticator mobile app.
Alternatively, out-of-band transport of tokens, including one-time
passwords sent via SMS or email or RSA/RADIUS, are supported.

Risk-Based Authentication

SAP Single Sign-On 2.0 (since SP5) offers risk-based authentication.
This means that an authentication process can dynamically adapt to the
context of an individual authentication request based on custom-defined
access policies. First, you check the context information of an
authentication attempt. This could be the IP address of the client,
location, date/time, device information, or user attributes such as
groups, for example. Secondly, based on this context information you
then make a dynamic decision on whether you accept or deny access, or
alternatively enforce two-factor authentication in case the context
indicates a higher risk. You could even reduce the privileges of the
person accessing the backend system, thus limiting the business
functionality available to this user.

RFID-Based Identification

For scenarios where users need quick access to a system to perform short
tasks, you can use fast user identification via radio-frequency
identification (RFID). The user is identified via an RFID token, such as
a company batch card. RFID authentication is ideally suited to warehouse
and production scenarios with dedicated kiosk PCs for authentication.

Digital Signatures

Digital signatures uniquely identify the signer, protect the integrity
of the data, and provide the means for a binding signature that cannot
be denied afterwards. SAP Single Sign-On supports digital signing using
the Secure Store and Forward (SSF) interface. The Secure Login Client
for SAP GUI can use X.509 certificates for digital signatures in an SAP
environment. Server-side digital signatures are supported by the SAP
Common Cryptographic Library. In addition, SAP Single Sign-On includes
support for server-side digital signatures via hardware security
modules, offering increased security and performance.

Certificate Lifecycle Management for ABAP Application Servers

SAP Single Sign-On 2.0 (since SP6) supports automated renewal of X.509
certificates for SAP NetWeaver Application Server ABAP using Secure
Login Server. This reduces manual efforts and prevents downtime.

 

图片 2

图片 3

图片 4

图片 5

图片 6

图片 7

图片 8

图片 9

图片 10

图片 11

图片 12

图片 13

图片 14

图片 15

图片 16

Mobile SSO with SAP Single Sign-On

The SAP Single Sign-On solution brings simplicity for your end-users by
eliminating the need for multiple passwords and user IDs. In addition,
you can lower the risks of unsecured login information, reduce help desk
calls, and help ensure the confidentiality and security of personal and
company data. In order to meet evolving security demands, you can extend
your single sign-on solution even further and offer your end-users
mobile single sign-on”. Your mobile users will have only one
password to remember, less typing of complicated user IDs and passwords,
and more time for actual work!

SAP Single Sign-On 2.0 (since SP4) supports single sign-on from mobile
devices, offering both a simple and secure solution for mobile access to
your corporate business processes. The solution is based on time-based
one-time passwords (TOTP) generated by the SAP Authenticator mobile app.
The SAP Authenticator mobile app is available for both iOS and Android,
and supports the IETF standard RFC
6238
.

We assume that the user already started the SAP Authenticator
application earlier in same day and now he wants to start using one of
his bookmarked web applications, for example SAP Mobile Portal.

 

图片 17

When the user clicks on the Mobile Portal bookmark, the SAP
Authenticator generates a new passcode and creates a URL (for example
https://portal_host/irj/portal?j_username=%5Busername%5D&j_passcode=%5Bpasscode%5D),
providing in the URL the UserName and the Passcode necessary for
authentication. Then SAP Authenticator sends the URL to the browser and
the browser opens the requested resource. The user sees only the
authentication result when the requested resource appears.

 

图片 18

Significant performance increase on all major platforms
• RSA, AES, SHA-2
• Perfect Forward Secrecy for TLS
• Ephemeral key agreement
• Elliptic curve Diffie-Hellman key exchange
• Elliptic curves P-224, P-256, P-384, P-521
• TLS 1.2 cipher suites in Galois Counter Mode (GCM)
• New command “sapgenpse tlsinfo” to help configure
cipher suite profile parameters for TLS


可望对您公司公司音讯化IT框架结构与管理有扶持。 别的您恐怕感兴趣的篇章:
软件项目危机管理介绍
店铺项目化管理介绍
智能公司与音讯化之一
由公司家基本素质想到的
高效软件品质担保的章程与执行
构建高速的研究开发与自动化运营
IT运营监察和控制消除方案介绍
IT持续集成之品管
红颜集团环境与集团文化
供销社绩效管理种类之平衡记分卡
合作社文化、团队文化与文化共享
高作用的团队建设
饮食连锁商店IT新闻解决决方案一

如有想打听更加多软件研发 , 系统 IT集成 , 公司消息化,项目管理,企业管理等消息,请关心自作者的微信订阅号:

图片 19

 

作者:Petter Liu
出处:http://www.cnblogs.com/wintersun/
正文版权归我和今日头条共有,欢迎转发,但未经小编同意必须保留此段注脚,且在小说页面明显地点给出原文连接,不然保留追究法律权利的职务。
该小说也还要宣布在本人的独立博客中-Petter Liu
Blog

相关文章

发表评论

电子邮件地址不会被公开。 必填项已用*标注

网站地图xml地图