Secure and Scalable Single Sign-On Architecture for Large-Scale Enterprise Environments

Main Article Content

Sreenivasula Reddy Gosangi

Abstract

As organizations evolve into complex, multi-application environments, the need for robust identity and access management (IAM) systems becomes critical. Single Sign-On (SSO) has emerged as a foundational element in enhancing user experience, ensuring compliance, and safeguarding enterprise data. This paper explores the design and implementation of a secure and scalable SSO architecture tailored for Oracle E-Business Suite R12.2 environments, leveraging Okta's rapid configuration model as a cost-effective and efficient solution. Unlike traditional Oracle middleware-based approaches using OID, OAM, OVD, and IDMS, which incur significant licensing and operational overhead, Okta offers cloud-native, standards-compliant integration with modern identity providers. The paper presents a comparative analysis of both models, identifies key security requirements, and provides a detailed architectural blueprint for deploying SSO with Okta in large-scale enterprise scenarios. Scalability, fault tolerance, user provisioning, and compliance considerations are addressed, supported by real-world data, performance metrics, architectural diagrams, and security models. The study demonstrates that Okta-based SSO not only reduces implementation complexity and cost but also delivers high availability, rapid deployment, and seamless user experience, making it a strategic choice for organizations undergoing digital transformation.

Article Details

Section

Articles

How to Cite

Secure and Scalable Single Sign-On Architecture for Large-Scale Enterprise Environments . (2024). International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 7(3), 10466-10471. https://doi.org/10.15662/IJRPETM.2024.0703003

References

Oracle Corporation. Oracle E-Business Suite R12 Security Guide. Oracle Documentation, 2021. https://docs.oracle.com/cd/E18727_01/doc.121/e12859/T360843T362758.htm

2. Okta, Inc. Okta Integration Network: Oracle E-Business Suite. Okta Documentation, 2023. https://developer.okta.com/docs/guides/oracle-ebs-integration/

3. M. S. Yadav, S. K. Singh, and R. K. Singh, “A Survey on Single Sign-On Systems,” International Journal of Computer Applications, vol. 119, no. 13, pp. 1–7, 2015. doi:10.5120/20781-3099.

4. J. Cameron, “The Laws of Identity,” Microsoft Corporation, 2005. https://www.identityblog.com/stories/2005/05/13/TheLawsOfIdentity.pdf

5. N. Hardt, “The OAuth 2.0 Authorization Framework,” IETF RFC 6749, 2012. https://tools.ietf.org/html/rfc6749

6. E. Maler and D. Reed, “The Security Assertion Markup Language (SAML) V2.0 Technical Overview,” OASIS Committee Draft, 2007. https://docs.oasis-open.org/security/saml/v2.0/saml-tech-overview-2.0-os.pdf

7. S. Rose, O. E. Feltovich, and M. G. Rozier, “Zero Trust Architecture,” NIST Special Publication 800-207, 2020. https://doi.org/10.6028/NIST.SP.800-207