Dynamic-ID-based scheme using a smart card or
crypto card that does not require a verification table
and implements the Single Sign On feature using the
SAML protocol, thus enabling users to enjoy all MSE
features along with SSO.
Furthermore, the research pane, Jian Hu et al.,
stated that frequent verification is an obstacle faced in
constructing campus networks. To overcome these
problems, they integrated the application of the B/S
architecture with the Single sign-on (SSO) system. As
a result, a unified personnel database has been created
using an LDAP server and created dynamic groups to
manage the database.
Single Sign On (SSO) is a system where users
only need one username and password to access and
use services on all existing applications. Central
Authentication Service (CAS) based on the CAS
Protocol is one part of the SSO product. CAS is used
to deal with communication problems between
different applications. With the Site on CAS on SSO
on all existing applications at the Manado State
Polytechnic, who can form application integration in
the form of a web portal. Users only need to log in
once to be able to use all the applications in the web
portal. Users also do not need to memorize many
accounts, just one account. Thus the organization and
integration of user data can be facilitated so that the
security of user data is more guaranteed because the
place used for storing user data becomes systematic
and centralized.
Therefore, one of the solutions to the problems
obtained for the centralized user authentication
system to access all applications at the Manado State
Polytechnic is expected to be implemented by
conducting SSO Technology Analysis with the
application of CAS at the Manado State Polytechnic,
where this research can help users more efficiently
and safely in accessing all existing applications.
From the explanation of the background above,
what can find problems can be discussed and studied
together? The authors formulate the problem in this
study, namely the use of Single Sign On System
Technology Analysis (SSO) with the Central
Authentication Service (CAS) application to access
web applications. Centrally in the system within the
Manado State Polytechnic.
2 PROPOSED METHOD
2.1 Action Research
Action research aims to develop the most efficient
work methods so that what can reduce production
costs and the productivity of institutions can be
increased. Action Research, or Action Research,
according to Davison, Martinsons, and Kock, is
action research that describes, interprets and explains
a social situation or, at the same time, makes changes
or interventions with the aim of improvement or
participation. The stages of research that are part of
this Action Research are:
1. Diagnosing: Identifying existing problems in
previous research becomes the basis for groups
or organizations so that further changes occur.
2. Action Planning: Understanding the main
problem, then developing an appropriate action
plan to solve the existing problem.
3. Action Taking: This action plan is expected to
solve the problem at the implementation stage.
4. Evaluating: The implementation results are
evaluated after the implementation period is
deemed sufficient.
Specifying Learning: This stage is the final part
that has been passed after the criteria in the learning
principle so that the research can end by reviewing
the stages.
2.2 Data Collection
In the data collection method, the authors obtain data
and information in the following ways:
1. Observation: Researchers directly reviewed the
Manado State Polytechnic for the UPT-IT,
which is the centre of the campus information
system.
2. Interview: At this stage, questions are submitted
to UPT-IT Manado State Polytechnic to get
accurate and direct information and data from
sources who know about the research conducted
by the author.
3. Literature: In this literature study, data is
obtained by searching and obtaining materials
on the internet, libraries and journals and books
that are by the object to be studied by the author.
2.3 Design System
The design of the Single Sign On (SSO) system in this
study is described by using a flowchart, as shown in
Figure 1. Starting with login access to the system, it
will then be checked if the user is registered or not. If
not, it is necessary to input the application username
and password and proceed to the SSO registration and