Q&A Categories

CA Siteminder Interview Questions and Answers

CA Siteminder SSO

What are various types of SSO?

In: CA Siteminder Asked By: [4 Grey Star Level]
Answer #1

Types of SSO:
Enterprise SSO
Federated SSO
 • Enterprise SSOEnterprise SSO is designed to provide single sign on to practically all the applications that an end user would need. This includes web apps, Windows executables (thick clients), Java apps and mainframe apps.
It works by capturing the user ID and password for the application when the user logs in. The next time the application is launched, Enterprise ESSO will detect it and automatically enter the credentials on the user’s behalf and log them in.
ESSO does not really authenticate the user to the application – it simply automates credential submission.
 Typically, Enterprise SSO systems provide a protected password store, and a client application is used to automatically provide these to applications when the credential is requested.  The user credentials can be managed from a centralized SSO Server whose main functionality is to distribute and synchronize credentials with the local agent store. For such applications, whenever a user tries to access an application, the SSO agent on the desktop retrieves the credentials based on user profile and populates them to the login screen of the application.
• Web SSO provides SSO capabilities to wider user base employees, business partners and customers accessing the applications. It is a browser-based mechanism, with single sign-on to applications deployed on web servers (domain).The drawback is that the solution is limited to web based applications.
It can be deployed in 2 types of configurations:
Proxy Based Configuration: Proxy based configuration is typically used for centralized access management.
Agent based deployment: Agent based configuration is typically used for distributed access management.
Federated SSOis targeted at both employees and business partners, but like Web SSO, is limited to browser based technology. In a federated SSO environment, a user is able to obtain a single sign-on to not only web applications, but the applications of business partners by providing identity assertions using a protocol like SAML. The remote system can then validate the assertion and provide access if the assertion is trusted.

Agree With Answer Thumb up 1 Thumb down 0

Answers Answered By: Vaibhav [4 Grey Star Level]

Answer this Question

You must be Logged In to post an Answer.

Not a member yet? Sign Up Now »

Hot Interview Questions of CA Siteminder

Star Points Scale

Earn points for Posting and Commenting Papers!

Grey Sta Levelr [1 - 25 Grey Star Level]
Green Star Level [26 - 50 Green Star Level]
Blue Star Level [51 - 500 Blue Star Level]
Orange Star Level [501 - 5000 Orange Star Level]
Red Star Level [5001 - 25000 Red Star Level]
Black Star Level [25001+ Black Star Level]