Towards an Integrated Authentication System: Single Sign-On (SSO) Architecture for Higher Education Applications
Abstract
Keywords
Full Text:
PDFReferences
A. R. Pratama, F. M. Firmansyah, and F. Rahma, “Security awareness of single sign-on account in the academic community: the roles of demographics, privacy concerns, and Big-Five personality,” PeerJ Comput Sci, vol. 8, p. e918, Mar. 2022, doi: 10.7717/PEERJ-CS.918/SUPP-2.
Salmuasih and M. A. Setiawan, “Evaluasi Penerapan Single Sign-On Saml Dan Oauth 2.0: Studi Pada Perguruan Tinggi Yogyakarta,” JSiI (Jurnal Sistem Informasi), vol. 10, no. 1, pp. 41–49, Mar. 2023, doi: 10.30656/JSII.V10I1.6186.
N. M.-J. E. dan T. Informasi and undefined 2024, “Implementasi Single Sign On (SSO) Menggunakan Protokol OAuth Pada Sistem Informasi Kampus,” jurnal.uniki.ac.idI MuslimJurnal Elektronika dan Teknologi Informasi, 2024•jurnal.uniki.ac.id, vol. 5, no. 2, 2024, Accessed: Aug. 16, 2025. [Online]. Available: https://jurnal.uniki.ac.id/index.php/jet/article/view/515
M. Yusuf, M. Yusup, R. D. Pramudya, A. Y. Fauzi, and A. Rizky, “Enhancing User Login Efficiency via Single Sign-On Integration in Internal Quality Assurance System (eSPMI),” International Transactions on Artificial Intelligence, vol. 2, no. 2, pp. 164–172, Jun. 2024, doi: 10.33050/ITALIC.V2I2.556.
S. Student and M. Tech, “Design and Implementation of Enhanced Single Sign on System for Education Systems,” International Journal on Recent and Innovation Trends in Computing and Communication, vol. 5, no. 6, pp. 769-772–769 – 772, Jun. 2017, doi: 10.17762/IJRITCC.V5I6.851.
A. Ghiffari and P. Hendradi, “Implementasi Single sign on (SSO) Menggunakan Representational State Transfer (REST) dan Open Authorization (OAuth 2.0) (Studi kasus: Universitas Muhammadiyah Magelang),” Smart Comp :Jurnalnya Orang Pintar Komputer, vol. 12, no. 2, pp. 356–366, Apr. 2023, doi: 10.30591/SMARTCOMP.V12I2.4939.
J. Andjarwirawan, “Single Sign-On (SSO) Implementation Using Keycloak, RADIUS, LDAP, and PacketFence for Network Access,” Teknika, vol. 14, no. 1, pp. 41–46, Mar. 2025, doi: 10.34148/TEKNIKA.V14I1.1089.
G. Wang, J. Yu, and Q. Xie, “Security analysis of a single sign-on mechanism for distributed computer networks,” IEEE Trans Industr Inform, vol. 9, no. 1, pp. 294–302, 2013, doi: 10.1109/TII.2012.2215877.
T. N. Hidayat and I. Riadi, “Optimation Wireless Security IEEE 802.1X using the Extensible Authentication Protocol-Protected Extensible Authentication Protocol (EAP-PEAP),” Int J Comput Appl, vol. 174, no. 11, pp. 25–30, Jan. 2021, doi: 10.5120/IJCA2021920988.
A. K. Yadav, M. Misra, P. K. Pandey, P. Ranaweera, M. Liyanage, and N. Kumar, “A Secure Authentication Protocol for IoT-WLAN Using EAP Framework,” IEEE Trans Dependable Secure Comput, vol. 22, no. 1, pp. 49–65, 2025, doi: 10.1109/TDSC.2024.3388467.
D. Mortágua, A. Zúquete, and P. Salvador, “Enhancing 802.1X authentication with identity providers using EAP-OAUTH and OAuth 2.0,” Computer Networks, vol. 244, p. 110337, May 2024, doi: 10.1016/J.COMNET.2024.110337.
S. K. Bhosale, “Architecture of a single sign on (SSO) for Internet banking,” IET Conference Publications, no. 535 CP, pp. 103–105, 2008, doi: 10.1049/CP:20080155.
S. Suoranta, K. Manzoor, A. Tontti, J. Ruuskanen, and T. Aura, “Logout in single sign-on systems: Problems and solutions,” Journal of Information Security and Applications, vol. 19, no. 1, pp. 61–77, Feb. 2014, doi: 10.1016/J.JISA.2014.03.005.
K. Peffers, T. Tuunanen, M. A. Rothenberger, and S. Chatterjee, “A design science research methodology for information systems research,” Journal of Management Information Systems, vol. 24, no. 3, pp. 45–77, Dec. 2007, doi: 10.2753/MIS0742 1222240302;PAGE:STRING:ARTICLE/CHAPTER.
A. Hevner and S. Chatterjee, “Design Science Research Frameworks,” pp. 23–31, 2010, doi: 10.1007/978-1-4419-5653-8_3.
J. R. Lewis, “The System Usability Scale: Past, Present, and Future,” Int J Hum Comput Interact, vol. 34, no. 7, pp. 577–590, Jul. 2018, doi: 10.1080/10447318.2018.1455307;WGROUP:STRING:PUBLICATION.
G. W. Sasmito, L. O. M. Zulfiqar, and M. Nishom, “Usability Testing based on System Usability Scale and Net Promoter Score,” 2019 2nd International Seminar on Research of Information Technology and Intelligent Systems, ISRITI 2019, pp. 540–545, Dec. 2019, doi:
1109/ISRITI48646.2019.9034666.
S. Fugkeaw, S. Rattagool, P. Jiangthiranan, and P. Pholwiset, “FPRESSO: Fast and Privacy-Preserving SSO Authentication With Dynamic Load Balancing for Multi-Cloud-Based Web Applications,” IEEE Access, vol. 12, pp. 157888–157900, 2024, doi: 10.1109/ACCESS.2024.3485996.
O. Suria, “A Statistical Analysis of System Usability Scale (SUS) Evaluations in Online Learning Platform,” Journal of Information Systems and Informatics, vol. 6, no. 2, pp. 992–1007, Jun. 2024, doi: 10.51519/JOURNALISI.V6I2.750.
Al-Mousa, M., & Al-Debei, M. M. (2021). Design and implementation of secure single sign-on (SSO) system for cloud-based educational platforms. International Journal of Advanced Computer Science and Applications, 12(8), 457–465. https://doi.org/10.14569/IJACSA.2021.0120853
DOI: https://doi.org/10.17509/coelite.v4i2.90335
Refbacks
- There are currently no refbacks.
Journal of Computer Engineering, Electronics and Information Technology (COELITE)
is published by UNIVERSITAS PENDIDIKAN INDONESIA (UPI),
and managed by Department of Computer Enginering.
Jl. Dr. Setiabudi No.229, Kota Bandung, Indonesia - 40154
email: coelite@upi.edu
e-ISSN: 2829-4149
p-ISSN: 2829-4157



