Skip to main content

SSO & Identity Management

Core Concepts

SSO (Single Sign-On) — authenticate once, access many systems with the same credentials.

Identity Federation — users access multiple systems across trust boundaries using one identity.

IdP (Identity Provider) — the trusted service that authenticates users and issues tokens/assertions.


SSO Technologies

TechnologyTypeDescription
SAML 2.0ProtocolXML-based. Authenticates once, reuses across services. Common in enterprise SSO.
OAuth 2.0FrameworkAuthorization — grants limited access without sharing credentials.
OpenID ConnectProtocolIdentity layer on top of OAuth 2.0. Adds user info (who you are).
KerberosProtocolNetwork auth via tickets. Used in AD environments for SSO.

SAML vs OAuth vs OIDC

SAMLOAuth 2.0OpenID Connect
PurposeAuthentication + AuthorizationAuthorization onlyAuthentication
FormatXMLJSON (JWT)JSON (JWT)
Common useEnterprise SSOAPI access delegationSocial login

IAM (Identity & Access Management)

Manages who can access what across an organization.

Access Control Models

ModelDescriptionExample
DACDiscretionary — owner sets permissionsNTFS permissions
RBACRole-Based — permissions tied to role/groupAD group memberships
ABACAttribute-Based — conditions on attributesConditional access policies
MACMandatory — labels/classifications, system enforcedSELinux, MLS
Rule-basedIf/then rules applied to allFirewall ACLs

PIM (Privileged Identity Management)

Subset of IAM focused on high-privilege accounts: root, admins, service accounts.

What PIM Provides

Real-time visibility      → Monitoring all privileged activity
Accountability            → Tracking + nonrepudiation of actions
JIT access                → Just-in-time privilege — granted only when needed
Ephemeral credentials     → TOTP, tokens, keys — expire automatically
Password vaulting         → Secure storage + automated rotation of privileged creds
Alert on violations       → Real-time detection of policy breaches

Privileged Accounts PIM Covers

  • Root / superuser
  • Domain / local administrator
  • Network, cloud, and system admin accounts
  • Service accounts with elevated access

User Lifecycle (Onboarding → Offboarding)

Onboarding

1. Identity proofing       → Verify who the person is (ID, docs)
2. Account provisioning    → Create account, assign role/group/permissions
3. Device provisioning     → Issue device, apply MDM policy
4. Training                → Security awareness

Maintenance

Password resets, permission changes, device lock/wipe, activity monitoring

Offboarding / Deprovisioning

1. Disable account immediately
2. Revoke all access tokens and sessions
3. Collect device
4. Back up/reassign data
5. Delete account after retention period
6. Document all steps

Always apply principle of least privilege — grant only what the role requires.