Sistem Keamanan Otentikasi Pengguna Pada Modul Single Sign On Menggunakan OAuth 2.0 dan One Time Password
DOI:
https://doi.org/10.35960/ikomti.v6i1.1768Keywords:
Otentikasi, TSA, OAuth 2.0, Single Sign-On, OTPAbstract
Keamanan informasi menjadi prioritas utama dalam melindungi data sensitif pada sistem yang menangani transfer data. Penelitian ini mengembangkan sistem Technical Support Assistance (TSA) dengan keamanan yang ditingkatkan melalui kombinasi modul Single Sign-On (SSO) berbasis Open Authentication (OAuth 2.0) dan metode One-Time Password (OTP) berbasis waktu. Pendekatan ini menciptakan autentikasi dua faktor (2FA) yang efektif dalam menghadapi risiko serangan seperti sniffing, brute force attacks, dan man-in-the-middle (MITM). Hasil pengujian menunjukkan bahwa tanpa OTP, tingkat keberhasilan serangan adalah 63% untuk brute force, 50% untuk sniffing, dan 65% untuk MITM. Setelah penerapan Oauth 2.0 dan OTP, angka ini turun signifikan menjadi masing-masing 25%, 5%, dan 10%, membuktikan bahwa kombinasi OAuth 2.0 dan OTP meningkatkan perlindungan sistem secara signifikan. Dibandingkan metode autentikasi terdahulu, TSA menawarkan keunggulan berupa keamanan berbasis token dinamis, pengurangan risiko serangan secara drastis, integrasi yang lebih mudah dengan layanan lain, serta efisiensi autentikasi yang lebih tinggi. Penelitian ini memberikan solusi inovatif untuk meningkatkan keamanan data sensitif dan relevan bagi organisasi yang memerlukan perlindungan tingkat tinggi dalam sistem mereka.
References
[1] L. S. Polytechnic, “Network Security Based On Two-Factor Authentication System,” vol. 9, no. 2, pp. 1–14, 2021.
[2] I. Permana, M. Hardjianto, and K. A. Baihaqi, “Securing the Website Login System with the SHA256 Generating Method and Time-based One-time Password ( TOTP ),” vol. 2, no. 2, pp. 65–71, 2020.
[3] D. A. N. M. Api, U. Perjuangan, J. P. No, and K. Tawang, “RANCANG BANGUN SISTEM INFORMASI JUAL BELI MOTOR MENGGUNAKAN ONE TIME PASSWORD ( OTP ),” vol. 12, no. 2, pp. 1115–1122, 2024.
[4] V. Koundinya and S. Baliga, “A Review on Single Sign on as an Authentication Technique,” no. June, pp. 409–414, 2020.
[5] S. Purkayastha, J. W. Gichoya, and S. A. Addepally, “Implementation of a single sign-on system between practice, research and learning systems,” Appl Clin Inform, vol. 8, no. 1, pp. 306–312, Mar. 2017.
[6] R. Carbone et al., “Design and Security Assessment of Usable Multi-factor Authentication and Single Sign-On Solutions for Mobile Applications Design and Security Assessment of Usable Multi-factor Authentication and Single Sign-On Solutions for Mobile Applications Design and Security Assessment of Usable Multi-Factor Authentication and Single Sign-On Solutions for Mobile Applications A Workshop Experience Report,” IFIP Adv Inf Commun Technol, pp. 978-985, 2021.
[7] D. Anand, V. Khemchandani, M. Sabharawal, O. Cheikhrouhou, and O. Ben Fredj, “Lightweight Technical Implementation of Single Sign-On Authentication and Key Agreement Mechanism for Multiserver Architecture-Based Systems,” vol. 2021, pp. 939-944.
[8] Y. Sadqi, “Web OAuth-based SSO Systems Security,” no. March, 2020, Association for Computing Machinery, New York, NY, USA, Article 69, pp.1–7.
[9] V. No, “Edumatic : Jurnal Pendidikan Informatika,” vol. 4, no. 1, pp. 111–120, 2020.
[10] S. Kamila and M. Fadhli, “Rancangan Aplikasi Autentikasi Surat Digital dengan Metode One Time Password SHA-512 Berbasis Android,” vol. 6, pp. 1851–1860, 2022.
[11] M. Elsera, “IMPLEMENTASI SINGLE SIGN ON PADA WEB MENGGUNAKAN PROTOCOL OAUTH FACEBOOK,” vol. 16, no. 3, pp. 410-418, 2021.
[12] I. K. D. Senapartha, “Implementasi Single Sign-On Menggunakan Google Identity , REST dan OAuth 2 . 0 Berbasis Scrum,” vol. 7, pp. 307–320, 2021.
[13] W. Wicaksono, V. Suryani, F. Informatika, and U. Telkom, “Peningkatan Keamanan Protokol MQTT dengan Netpie sebagai Framework OAuth,” vol. 8, no. 1, pp. 809–818, 2021.
[14] I. Doi, “2017 IEEE Symposium on Privacy-Aware Computing,” pp. 210–211, 2017,.
[15] Y. Kim, “AFaaS : Authorization framework as a service for Internet of Things based on interoperable OAuth,” vol. 16, no. 2, pp. 9-16, 2020.
[16] X. Li, J. Xu, Z. Zhang, X. Lan, and Y. Wang, “Modular Security Analysis of OAuth 2 . 0 in the Three-Party Setting,” pp. 276–293, 2020.
[17] W. Li and C. J. Mitchell, “User Access Privacy in OAuth 2 . 0 and OpenID Connect,” no. 1, pp. 664–672, 2020.
[18] P. Philippaerts, K. U. Leuven, D. Preuveneers, and K. U. Leuven, OAuch : Exploring Security Compliance in the OAuth 2 . 0 Ecosystem, vol. 1, no. 1. Association for Computing Machinery, pp. 460-481, 2022.
[19] R. Kurniawan, “Perancangan dan Implementasi Sistem Otentikasi OAuth 2 . 0 dan PKCE Berbasis Extreme Programming ( XP ) Universitas Mercubuana Yogyakarta , Indonesia Design and Implementation of Authentication System OAuth 2 . 0 and PKCE Based on Extreme Programming ( XP ),” vol. 2, no. 2, pp. 81–91, 2022.
[20] A. Ghiffari, P. Hendradi, F. Teknik, T. Informatika, U. M. Magelang, and P. Tinggi, “Implementasi Single sign on ( SSO ) Menggunakan Representational State Transfer ( REST ) dan Open Authorization ( OAuth 2.0 ) ( Studi kasus : Universitas Muhammadiyah Magelang ),” pp. 356–366.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Ilham Gumeraruloh Arianto, Wina Witanti, Herdi Ashaury

This work is licensed under a Creative Commons Attribution 4.0 International License.