Rinky G. Chhatwani et al, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.6, June- 2014, pg. 623-632 © 2014, IJCSMC All Rights Reserved 623 Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320088X IJCSMC, Vol. 3, Issue. 6, June 2014, pg.623 632 RESEARCH ARTICLE Implementation of Single Sign-On Mechanism for Distributed Computing MS. Rinky G. Chhatwani 1 Dr.D.G.Harkut 2 M.E 2 nd yr, PRMCEAM, Badnera H.O.D, PRMCEAM, Badnera rinkychhatwani@gmail.com 1 dg.harkut@gmail.com 2 Abstract: With wide spreading of distributed computer networks, it has become popular to allow users accessing various network services offered by distributed service providers. It is usually not practical by asking one user to maintain different pairs of identity and passwords for different service providers, since this could increase the workload of both users and service providers as well as the communication overhead of networks. So, for this it requires a single sign-on authentication mechanism that is a single login for multiple service providers, which would not increase the workload. There are various attacks and parameters that need to be considered while providing security to authentication system. In this paper, we provide a comprehensive review of existing work done on Single sign-on. Then for security of single sign-on, what parameters and attacks should be covered. Next, Implementation of Single Sign-on for distributed computing using user-id and password along with biometric verification. Then security analysis is done. Next, we present the comparison and lastly we conclude, specifying the future work. Keywords: Authentication, Soundness, Anonymity, Single sign-On, Biometrics, security 1. INTRODUCTION In insecure network environments, Communication securely through open network is one of the common necessities. Cryptography is one of the primary tools for providing better security. The primary goals or aspects of security are data confidentiality, data integrity, and authentication [42]. Single Sign-on means that after obtaining a credential from a trusted authority, each legal user can use this single credential to authenticate itself and then access multiple service providers. Three methods can be used for secure Single Sign-On. 1. Cryptography based. 2. Using Smart Card. 3. Biometric based.