The software functionality abylon Single Sign-On (SSO) is offered for the products abylon KEYSAFE and abylon LOGON SSO Pro for the products abylon LOGON SSO Pro for the products. The SSO function supports the user in entering login data, such as login name and password. For this purpose, the login windows are learned once by entering the corresponding login data. This data is stored in encrypted form. In the future, the login data will be automatically saved by the software after the legitimation of the user. abylon Signle Sign-On in the corresponding fields. As legimitation the following hardware keys can be used:
NOTE: Special support on Request!
With the software abylon KEYSAFE a password can also be entered via the computer keyboard.
The abylon LOGON software solutions offer numerous additional possibilities in the clear administration area. For example, individual users, cards or applications can be activated, deactivated or blocked. The complete login data is stored in an encrypted XML file, so that a central administration on a server is also possible.
The number of required passwords is increasing inexorably and it is becoming more and more difficult for normal users to remember them all. As a strategy the user uses identical credentials for all authentications, easy to remember but insecure passwords or write them down in an insecure place. This undermines the security that is actually needed and provides crackers with a simple point of attack, such as phishing attacks. This uncertainty can put secret data in the wrong hands and, in the worst case, can even result in financial damage.
The software feature abylon Signle Sign-On provides helpful support without reducing security. The user only needs to authenticate once and can then access all securely stored credentials.
In networks with multiple users, accounts and credentials can be centrally managed by one administrator. By using hardware tokens (e.g. chip cards or USB sticks), the individual employee no longer has access to the real login data. During the Single Sign-On process, the real keyboard and mouse input was blocked by a special software procedure so that the login data cannot be redirected to plain text fields and thus spied out.
The administrator can change the real access data independently without having to relearn the tokens. Individual tokens can also be temporarily deactivated or locked as required. A complete removal of the tokens from the database makes further use impossible.
In networks with multiple users, accounts and credentials can be centrally managed by one administrator. By using hardware tokens (e.g. chip cards or USB sticks), the individual employee no longer has access to the real login data. During the Single Sign-On process, the real keyboard and mouse input was blocked by a special software procedure so that the login data could not be redirected to plain text fields and thus spied out. The administrator can change the real access data independently without having to relearn the hardware keys. Individual keys can also be temporarily deactivated or locked as required.
Functions of the individual versions see Table!
The CT32 interface is an outdated standard, which should not be used anymore for compatibility reasons.