{"id":16581,"date":"2024-03-01T11:30:21","date_gmt":"2024-03-01T08:30:21","guid":{"rendered":"https:\/\/authtake.com\/?p=16581"},"modified":"2024-03-01T11:37:00","modified_gmt":"2024-03-01T08:37:00","slug":"how-single-sign-on-behind-mechanical-magic-works","status":"publish","type":"post","link":"https:\/\/authtake.com\/tr\/how-single-sign-on-behind-mechanical-magic-works\/","title":{"rendered":"Mekanik Sihrin Arkas\u0131ndaki Tekli Oturum A\u00e7ma Nas\u0131l \u00c7al\u0131\u015f\u0131r?"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"16581\" class=\"elementor elementor-16581\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2a409bb elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-sticky-section-no\" data-id=\"2a409bb\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-315c82a1\" data-id=\"315c82a1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-61147d1c elementor-widget elementor-widget-text-editor\" data-id=\"61147d1c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p style=\"font-weight: 400;\">Bir kahve almak isterken bile ismimizi iki kere tekrarlad\u0131\u011f\u0131m\u0131z bu zamanda tek bir kimlik do\u011frulamayla birden fazla sisteme eri\u015fmek sihir de\u011fil de nedir? \u0130\u015fte Tekli Oturum A\u00e7ma (SSO) bu sihrin kendisidir\u2026 Her uygulamaya ayr\u0131 bir kullan\u0131c\u0131 ad\u0131 ve parola olu\u015fturmak hem zaman kayb\u0131 hem de \u00e7ok bilinmeyenli bir denkleme d\u00f6n\u00fc\u015f\u00fcrken SSO ile tek bir ad\u0131mda ba\u011fl\u0131 olunan sistemlere giri\u015f yapmak saniyeler s\u00fcr\u00fcyor. Her sihirbaz\u0131n bir hilesi oldu\u011fu gibi, SSO da ard\u0131nda d\u00fczenli bir i\u015fleyi\u015f bar\u0131nd\u0131r\u0131yor. Hadi gelin bu mekanizman\u0131n nas\u0131l \u00e7al\u0131\u015ft\u0131\u011f\u0131na birlikte g\u00f6z atal\u0131m!<\/p><p style=\"font-weight: 400;\">\u00a0<\/p><p style=\"font-weight: 400;\">Tekli Oturum A\u00e7ma (SSO), \u00e7oklu eri\u015fim kontrol\u00fc \u00e7\u00f6z\u00fcmlerinden biridir ve kurumunuzdaki payda\u015flar\u0131n\u0131z i\u00e7in zamandan tasarruf etmeyi sa\u011flar. Tekli oturum a\u00e7ma y\u00f6nteminin bir di\u011fer avantaj\u0131 da yeni uygulama ve sistemleri SSO sistemine dahil etmenin \u00e7ok kolay olmas\u0131d\u0131r. Tabii ki SSO\u2019nun bu kolayl\u0131klar\u0131 ger\u00e7ekle\u015ftirebilmek i\u00e7in katmanl\u0131 bir s\u00fcreci takip etmesi ve do\u011fru bilgiyi do\u011fru yere ula\u015ft\u0131rmas\u0131 gerekir. T\u00fcm bu s\u00fcre\u00e7te \u015fu ad\u0131mlar izlenir:<\/p><p style=\"font-weight: 400;\">\u00a0<\/p><ul><li><strong><em>Kimlik Do\u011frulama Talebi: <\/em><\/strong>Kimli\u011fini do\u011frulamak isteyen kullan\u0131c\u0131lar taraf\u0131ndan sisteme bir talep g\u00f6nderilir. Bu talep, s\u00fcreci ba\u015flatan ilk ad\u0131md\u0131r.<\/li><\/ul><p style=\"font-weight: 400;\">\u00a0<\/p><ul><li><strong><em>\u0130stek Y\u00f6nlendirme: <\/em><\/strong>SSO sa\u011flay\u0131c\u0131s\u0131 taraf\u0131ndan do\u011frulama iste\u011fi, SSO sistemine g\u00f6nderilir.<\/li><\/ul><p style=\"font-weight: 400;\">\u00a0<\/p><ul><li><strong><em>Kullan\u0131c\u0131n\u0131n Kimlik Do\u011frulama Sayfas\u0131na Y\u00f6nlendirilmesi: <\/em><\/strong>S\u0131radaki ad\u0131m, talebi olu\u015fturan kullan\u0131c\u0131n\u0131n SSO sa\u011flay\u0131c\u0131s\u0131n\u0131n kimlik do\u011frulama sayfas\u0131na y\u00f6nlendirilmesidir. Kimlik bilgileri istenen ki\u015fi, kullan\u0131c\u0131 ad\u0131 ve \u015fifresi gibi bilgileri gerekli alanlara girer.<\/li><\/ul><p style=\"font-weight: 400;\">\u00a0<\/p><ul><li><strong><em>Do\u011frulaman\u0131n Ger\u00e7ekle\u015fmesi: <\/em><\/strong>Kullan\u0131c\u0131 bilgilerinin do\u011fru olmas\u0131 durumunda SSO sa\u011flay\u0131c\u0131s\u0131 ki\u015fiye \u00f6zel bir token olu\u015fturur. Belirli bir s\u00fcre i\u00e7in ge\u00e7erli olan bu token, genellikle JSON Web Token veya ba\u015fka bir benzer veri format\u0131nda olur. Kullan\u0131c\u0131n\u0131n kimli\u011fi, tokenin t\u00fcr\u00fc, ge\u00e7erlilik s\u00fcresi ve di\u011fer \u00f6zel bilgi ve yetkilendirmeyi i\u00e7eren veri yap\u0131s\u0131, yetkilendirme ve do\u011frulama ad\u0131mlar\u0131n\u0131 bar\u0131nd\u0131ran veriler b\u00fct\u00fcn\u00fcd\u00fcr.<\/li><\/ul><p style=\"font-weight: 400;\">\u00a0<\/p><ul><li><strong><em>Token Da\u011f\u0131tma: <\/em><\/strong>SSO sa\u011flay\u0131c\u0131s\u0131 taraf\u0131ndan dijital olarak imzalanan token, kullan\u0131c\u0131n\u0131n taray\u0131c\u0131s\u0131na veya cihaz\u0131na g\u00f6nderilir. Ba\u015fka bir uygulamaya giri\u015f yapmak istedi\u011finde ise kimlik do\u011frulamay\u0131 temsil eden tokenler (e\u011fer s\u00fcresi ge\u00e7mediyse) devreye girer.<\/li><\/ul><p style=\"font-weight: 400;\">\u00a0<\/p><ul><li><strong><em>SSO Sa\u011flay\u0131c\u0131 Do\u011frulama <\/em><\/strong>Giri\u015f talebi olu\u015fturulan uygulama, SSO sa\u011flay\u0131c\u0131s\u0131ndaki tokenin ge\u00e7erli olup olmad\u0131\u011f\u0131n\u0131 denetler. SSO sa\u011flay\u0131c\u0131s\u0131n\u0131n tokeni do\u011frulad\u0131\u011f\u0131 durumda kullan\u0131c\u0131n\u0131n kimli\u011fi onaylanm\u0131\u015f olur.<\/li><\/ul><p style=\"font-weight: 400;\">\u00a0<\/p><ul><li><strong><em>Uygulamaya Eri\u015fim: <\/em><\/strong>Token do\u011fruland\u0131ktan sonra uygulama, kullan\u0131c\u0131ya eri\u015fim iznini verir ve oturum a\u00e7ma i\u015flemi tamamlan\u0131r.<\/li><\/ul><p style=\"font-weight: 400;\">\u00a0<\/p><p style=\"font-weight: 400;\">Tek do\u011frulama ad\u0131m\u0131yla kay\u0131tl\u0131 sistemlerin t\u00fcm\u00fcne giri\u015f yapabilmek, \u201cHerhangi bir olumsuzlukta t\u00fcm hesaplar riske at\u0131l\u0131yor\u201d alg\u0131s\u0131 yaratabilir. Fakat Tekli Oturum A\u00e7ma, \u015fifresiz giri\u015f alternatifleriyle entegre olabilen yap\u0131s\u0131 sayesinde en g\u00fcvenilir y\u00f6ntemler aras\u0131ndad\u0131r. Bir \u015fifrenin kaybolmas\u0131 birden fazla hesab\u0131n\u0131z\u0131n tehlikeye girmesi demektir ama ortada bir \u015fifre yoksa b\u00f6yle bir risk de yoktur! Biyometrik veriler, tek kullan\u0131ml\u0131k kodlar, anl\u0131k bildirimler veya QR kod gibi parolas\u0131z kimlik do\u011frulama y\u00f6ntemleri SSO\u2019nun bir par\u00e7as\u0131d\u0131r.<\/p><p style=\"font-weight: 400;\">\u00a0<\/p><p style=\"font-weight: 400;\">AuthTake Tekli Oturum A\u00e7ma Y\u00f6ntemi ile kurumunuzdaki t\u00fcm payda\u015flar\u0131n eri\u015fimlerini ve g\u00fcvenlik politikalar\u0131n\u0131 tek bir merkezden y\u00f6netebilmek, yetkilendirme a\u015famalar\u0131ndaki hatalar\u0131n da \u00f6n\u00fcne ge\u00e7er. B\u00f6ylece sorunsuz bir eri\u015fim y\u00f6netimi sunar. Kullan\u0131c\u0131 deneyimi, g\u00fcvenlik ve y\u00f6netim a\u00e7\u0131s\u0131ndan birden fazla avantaja sahip SSO, b\u00fcy\u00fck \u015firketler veya bireysel kullan\u0131c\u0131lar fark etmeksizin s\u0131k\u00e7a tercih edilen bir y\u00f6ntem haline gelmi\u015ftir. Mobil cihazlara ve bulut tabanl\u0131 modern teknolojilere uyumlanabildi\u011fi i\u00e7in esnek \u00e7al\u0131\u015fma ortamlar\u0131na adapte olabilir. B\u00f6ylece kullan\u0131c\u0131lar farkl\u0131 konum veya cihazlardan g\u00fcvenli bir \u015fekilde eri\u015fim sa\u011flayabilir. Optimize edilmi\u015f i\u015f s\u00fcre\u00e7leri sayesinde kimlik do\u011frulama ve giri\u015f s\u00fcreci, en g\u00fcvenilir haliyle kontrol alt\u0131nda tutulur.<\/p><p style=\"font-weight: 400;\">\u00a0<\/p><p style=\"font-weight: 400;\">AuthTake Tekli Oturum A\u00e7ma (SSO) ile ilgili daha ayr\u0131nt\u0131l\u0131 bilgi edinmek ve bu sihir sayesinde eri\u015fim y\u00f6netiminize yeni bir soluk getirmek i\u00e7in bizimle ileti\u015fime ge\u00e7ebilirsiniz.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f996ee1 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"f996ee1\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/authtake.com\/tr\/company-contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Bize Ula\u015f\u0131n<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>At a time when we have to repeat our name twice even to buy a coffee, what is accessing multiple systems with a single authentication if not magic? This is the magic of Single Sign-On (SSO)&#8230; While creating a separate username and password for each application is both a waste of time and a multi-knowledge equation, with SSO, it takes seconds to log in to the connected systems in a single step. Just like every magician has a trick up his sleeve, SSO has an organized mechanism behind it. Let&#8217;s take a look at how this mechanism works! Single Sign-On (SSO) is one of the multiple access control solutions and saves time for stakeholders in your organization. Another advantage of single sign-on is that it is very easy to incorporate new applications and systems into the SSO system. Of course, in order to achieve these facilities, SSO must follow a layered process and deliver the right information to the right place. The following steps are followed in this entire process: Authentication Request: A request is sent to the system by users who wish to verify their identity. This request is the first step in the process. Request Routing: The SSO provider sends the verification request to the SSO system. Redirecting the User to the Authentication Page: The next step is to redirect the user who created the request to the SSO provider&#8217;s authentication page. The person whose identity information is requested enters information such as username and password into the required fields. Realization of Verification: If the user information is correct, the SSO provider generates a personalized token. This token, which is valid for a certain period of time, is usually in JSON Web Token or another similar data format. The data structure, which includes the user&#8217;s identity, token type, validity period and other special information and authorization, is the set of data that includes the authorization and verification steps. Token Distribution: Digitally signed by the SSO provider, the token is sent to the user&#8217;s browser or device. When you want to log in to another app, tokens representing authentication (if they have not expired) are activated. SSO Provider Verification: The application that created the login request checks whether the token in the SSO provider is valid. If the SSO provider verifies the token, the user&#8217;s identity is confirmed. Access to Application: Once the token is verified, the application grants the user access and the login is complete. Being able to log in to all registered systems with a single verification step can create the perception that &#8220;all accounts are put at risk in the event of an adverse event\u2019\u2019. However, Single Sign On is among the most reliable methods thanks to its structure that can be integrated with passwordless login alternatives. Losing a password means that more than one of your accounts could be compromised, but if there is no password, there is no risk! Passwordless authentication methods such as biometric data, one-time codes, push notifications or QR codes are part of SSO. With the AuthTake Single Sign-On Method, managing the access and security policies of all stakeholders in your organization from a single center prevents errors in authorization stages. Thus, it offers a seamless access management. With multiple advantages in terms of user experience, security and management, SSO has become a frequently preferred method regardless of large companies or individual users.&nbsp; It may adapt to flexible working environments as it is adaptable to mobile devices and modern cloud-based technologies. This allows users to access securely from different locations or devices. Thanks to optimized business processes, the authentication and login process is kept under control in the most reliable way. You can contact us to get more detailed information about AuthTake Single Sign-On (SSO) and bring a new breath to your access management with this magic. Contact Us<\/p>","protected":false},"author":4,"featured_media":16590,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[5],"tags":[],"_links":{"self":[{"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/posts\/16581"}],"collection":[{"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/comments?post=16581"}],"version-history":[{"count":9,"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/posts\/16581\/revisions"}],"predecessor-version":[{"id":16591,"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/posts\/16581\/revisions\/16591"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/media\/16590"}],"wp:attachment":[{"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/media?parent=16581"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/categories?post=16581"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/authtake.com\/tr\/wp-json\/wp\/v2\/tags?post=16581"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}