User guide

v
Table of Contents
Chapter 1 Overview
What Is Single Sign-on ...................................................................................................................1-2
Problems in Conventional Systems...........................................................................................1-2
Effects of Single Sign-on............................................................................................................1-4
Implementation Method .............................................................................................................1-5
Basic System Configuration............................................................................................................1-6
Authentication Infrastructure......................................................................................................1-7
Business System .....................................................................................................................1-11
Client........................................................................................................................................1-13
Administrators ...............................................................................................................................1-14
Authentication ...............................................................................................................................1-15
Password and Certificate Authentication.................................................................................1-15
Combinations of Authentication Methods ................................................................................1-23
User Information ......................................................................................................................1-24
Authentication Information.......................................................................................................1-25
Authentication in a Multi-domain Environment ........................................................................1-25
Certificate Selection Windows .................................................................................................1-26
Restrictions on Authentication .................................................................................................1-28
Authorization .................................................................................................................................1-35
Relationships between Roles, Users, and Resources ............................................................1-35
Information Required for Authorization Using Roles ...............................................................1-36
Centralized Management of User and Access Control Information ........................................1-39
Updating Access Control Information ......................................................................................1-40
High-Performance and High-Reliability System ...........................................................................1-42
Load Balancing ........................................................................................................................1-42
Increase of System Availability ................................................................................................1-44
Linkage with SSL Accelerator ..................................................................................................1-47
Linkage with Application Gateway...........................................................................................1-49
Linkage with Web Applications ................................................................................................1-56
Choosing URLs.............................................................................................................................1-57
Authentication infrastructure URL............................................................................................1-57