Journal of Information Security

Volume 6, Issue 3 (July 2015)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.79  Citations  

Evaluating the Efficiency and Effectiveness of a Federated SSO Environment Using Shibboleth

HTML  XML Download Download as PDF (Size: 1532KB)  PP. 166-178  
DOI: 10.4236/jis.2015.63018    5,221 Downloads   6,394 Views  Citations

ABSTRACT

The notion of this project is derived from our practical use of user authentication system namely Shibboleth at the University of Bedfordshire. It has been found that the University of Bedfordshire controls its various services including student portal Breo, Learning Resources and Student Email Access and others through the Shibboleth. Like the University of Bedfordshire the other Universities in the UK are also implementing the Shibboleth system in their access management control. Therefore, the researchers of this project have found it important to evaluate its efficiency and effectiveness of Shibboleth from different perspectives. In the first part of this paper it tries to explain the features of Shibboleth as SSO services and compares it with other SSO services like Athens, Kerberos, etc. Then in the middle section, the authors go through the steps of installation and configuration of the Shibboleth. In the end of the paper, based on the survey of real users of Shibboleth at the University of Bedfordshire, the authors give its insights on the effectiveness of the Shibboleth as SSO service. Throughout this investigation, the authors have applied a triangulation to find out user and service provider viewpoint about Shibboleth. Although there were some problems persisted, the authors also implemented the Shibboleth system successfully to figure out different problems, efficiency and effectiveness. The recommendations and conclusion have been provided at the end of this project.

Share and Cite:

Kamal, P. , Mustafiz, S. , Rahman, F. and Taher, R. (2015) Evaluating the Efficiency and Effectiveness of a Federated SSO Environment Using Shibboleth. Journal of Information Security, 6, 166-178. doi: 10.4236/jis.2015.63018.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.