Misplaced Pages

Federated identity

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.

This is an old revision of this page, as edited by 80.194.77.90 (talk) at 10:54, 25 January 2013 (Added request for additional citations. Existing article has only one, but there are many more published sources. The article itself seems brief, but accurate in as far as it goes.). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Revision as of 10:54, 25 January 2013 by 80.194.77.90 (talk) (Added request for additional citations. Existing article has only one, but there are many more published sources. The article itself seems brief, but accurate in as far as it goes.)(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)
This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.
Find sources: "Federated identity" – news · newspapers · books · scholar · JSTOR (January 2013) (Learn how and when to remove this message)

A federated identity in information technology is the means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems.

Related to federated identity is single sign-on (SSO), in which a user's single authentication ticket, or token, is trusted across multiple IT systems or even organizations. SSO is a subset of federated identity management, as it relates only to authentication and is understood on the level of technical interoperability.

Technologies

Technologies used for federated logon include SAML (Security Assertion Markup Language), OAuth and OpenID as well as proprietary standards.

Examples

Digital identity platforms that allow users to log onto third-party websites, applications, mobile devices and gaming systems with their existing identity, i.e. enable social login, include:

In many cases there is also the possibility to exchange profile information about the user with the third party site, for example name, address, email, and photo.

See also

References

  1. http://www.projectliberty.org/liberty/content/download/387/2720/file/Liberty_Federated_Social_Identity.pdf
Categories: