Exploring Open Source SSO Solutions for Enhanced Security


Intro
Open source Single Sign-On (SSO) solutions have emerged as a crucial component in modern digital authentication strategies. As organizations increasingly seek to simplify user access while maintaining robust security standards, the significance of SSO cannot be overstated. Open source offerings provide a unique proposition as they allow significant customization, community-driven development, and no vendor lock-in. This article will explore the key features, benefits, and challenges of implementing open source SSO solutions, targeting IT professionals, software developers, and businesses of varying sizes.
Key Features and Benefits
Overview of Features
Open source SSO solutions typically present a range of features designed to enhance user experience and security. Some of the notable functionalities include:
- Centralized Authentication: Users can authenticate once and gain access to multiple applications without needing to log in repeatedly. This reduces password fatigue, as users do not need to memorize numerous credentials.
- Protocols Support: These solutions often support various authentication protocols, including OAuth, SAML, and OpenID Connect, which enables flexibility and interoperability among different services.
- Customization: Being open source, these solutions can be tailored to meet specific organizational needs, allowing for the enhancement of user interface and experience.
- User Management: Features often include role-based access control (RBAC) and detailed user management capabilities, assisting organizations in maintaining proper access protocols.
Benefits to Users
The benefits of implementing open source SSO solutions extend beyond the technical realms. Users and organizations can expect:
- Improved Security: Centralized control over access can lead to better security posture by making it easier to enforce policies and monitor access logs.
- Cost Effectiveness: Many open source SSO solutions do not carry licensing fees, which can translate to substantial savings, especially for small and medium enterprises.
- Enhanced User Experience: Streamlining logins fosters a positive user experience, leading to increased productivity and satisfaction by minimizing the friction commonly associated with multiple sign-ins.
The adoption of open source SSO solutions can significantly improve not only security measures but also the overall user experience, which is crucial in the contemporary digital landscape.
Comparison with Alternatives
Head-to-Head Feature Analysis
When evaluating open source SSO solutions against proprietary options, several factors come into play:
- Flexibility: Open source options like Keycloak or Gluu offer extensive customization capabilities.
- Community Support: Solutions like Apache Shiro have vast communities that contribute plugins and enhancements.
- Documentation: Proprietary solutions often come with detailed documentation, simplifying understanding for end-users. However, open source alternatives accumulate documentation through community contributions, which may or may not meet traditional standards.
Pricing Comparison
While licensing costs of proprietary solutions, such as Microsoft Azure Active Directory or Okta, can escalate depending on features chosen, open source solutions typically present fewer immediate financial burdens. Instead, organizations must consider the total cost of ownership, which includes implementation, support, and maintenance. Some organizations might find that opting for an open source solution involves an upfront investment in technical expertise, but overall operational costs are generally lower in the long run.
The exploration of open source SSO solutions reveals their potential to transform user authentication landscapes. By analyzing the features, benefits, and comparative costs, organizations will better understand how to effectively implement such systems to maximize security and efficiency.
Understanding Single Sign-On
In today's digital landscape, user experience and security are paramount. Single Sign-On (SSO) plays a significant role in addressing these needs by simplifying the authentication process. Businesses large and small find that SSO reduces the number of login credentials a user needs to remember. This ease of use can directly lead to increased productivity and decreased support requests related to password resets.
Moreover, understanding SSO technologies is crucial for IT professionals and organizations aiming to enhance their user management capabilities. Without SSO, users often face multiple authentication prompts across different applications. This can lead to frustration and inefficiency. An effective SSO strategy allows users to sign in once and gain access to multiple services seamlessly. This not only streamlines workflow but significantly improves the security posture by reducing the risk of weak passwords.
There are several considerations associated with implementing SSO. They include the need for robust security protocols, potential technical integration challenges, and compliance with data protection regulations. Nonetheless, the benefits of SSO often outweigh the challenges, making it an important topic for discussion.
Definition and Overview
Single Sign-On is an authentication process that allows a user to access multiple applications with a single set of login credentials. This means once a user logs in, they do not have to re-enter credentials for every application they wish to access. The core principle behind SSO is to simplify the user experience while enhancing security by enabling centralized authentication.
SSO solutions typically involve a combination of protocols and standards, such as OAuth, OpenID Connect, and SAML. Each of these protocols has its unique advantages and use cases. For instance, OAuth allows a user to approve one application to access information from another without sharing the password.
A practical example can be seen in Google services. When you log into Gmail, you also gain access to other services like Google Drive and YouTube without having to log in again. This illustrates the convenience and efficiency SSO provides to users.
History of SSO Technologies
The evolution of SSO can be traced back to the early days of web applications. Initially, user authentication was a simple process, typically involving individual logins for each application. This situation became unwieldy as the number of applications increased, leading to user frustration.
In the late 1990s, SSO technologies began gaining traction. Early implementations often focused on enterprise-level applications, where large organizations needed a way to manage user access efficiently. Technologies like Kerberos emerged during this time, offering a secure method of authenticating users and services in a network.
As the internet matured, so did the complexity of web applications. New protocols like Security Assertion Markup Language (SAML) appeared around the early 2000s to facilitate SSO across different domains. SAML allows for cross-domain SSO, which is essential in cloud applications.
In recent years, the rise of microservices architecture and the increasing emphasis on API interactions have led to the development of new SSO standards like OAuth 2.0 and OpenID Connect. These modern protocols provide flexible and secure solutions for managing user identities in an interconnected web environment.
Recognizing the historical progression of SSO technologies provides valuable insights into how they can be applied today. Organizations can learn from past implementations to make informed decisions about adopting open-source SSO solutions. Overall, SSO represents a critical advancement in the ongoing effort to balance user convenience with security.
The Open Source Paradigm
The open source paradigm represents a notable shift in how software development is viewed and executed. In the context of Single Sign-On (SSO) solutions, this paradigm plays a crucial role. It fosters collaboration among developers, allows for rapid innovation, and enhances the overall quality of software. Understanding this framework is essential for developers and organizations looking to implement open source SSO.
One key aspect of open source software is its collaborative nature. Developers from diverse backgrounds contribute to projects, sharing their expertise and insights. This collective effort can lead to the development of high-quality solutions that are tested and refined by many users. As a consequence, open source SSO options tend to be more secure and reliable than their proprietary counterparts.
Another important element is transparency. Since the source code is available for anyone to inspect, it contributes to greater trust among users. Organizations can confidently assess the security measures embedded in these solutions, enabling a deeper understanding of potential vulnerabilities. This transparency aids organizations in compliance efforts with legal and regulatory requirements regarding user data and authentication processes.


Moreover, the open source model often leads to adaptability. Businesses can tailor the solutions to fit their specific needs, creating custom features or addressing unique security challenges. This flexibility may not be possible with proprietary solutions, which usually come with set functionalities dictated by the vendor.
In summary, the open source paradigm empowers organizations and developers alike with tools to create effective SSO solutions. This approach emphasizes collaboration, transparency, and adaptability — all critical components for navigating the intricate landscape of user authentication.
What is Open Source Software?
Open source software refers to any program whose source code is made available to the public for use, modification, and distribution. This model is grounded in the principle of collaboration, allowing users to contribute to the software’s development process. Notably, open source software is not synonymous with free software; while many open source programs are available at no cost, the freedom to modify and share the code is the core principle. There are also various licenses governing open source projects, such as the MIT License or the GNU General Public License, defining how the software can be used and shared.
Advantages of Open Source Solutions
Open source solutions provide a multitude of benefits for organizations:
- Cost-Effectiveness: Since many open source applications are free, they reduce the total cost of ownership, making them attractive for organizations of all sizes.
- Customization: Users have the freedom to modify the software to better fit their requirements, which is especially important for unique workflows or security needs.
- Community Support: Open source projects often foster vibrant communities that offer support, documentation, and forums for troubleshooting.
- No Vendor Lock-in: Organizations can avoid dependencies on a single vendor, providing greater control over their software stack. This enhances flexibility in future technology choices.
"Open source solutions not only lower barriers for entry but also drive innovation through collaborative development practices."
Despite these advantages, organizations should assess their capabilities to maintain and support open source software, given that self-management might be required compared to commercially supported products. As such, careful consideration is essential when adopting open source SSO solutions.
Key Features of Open Source SSO Solutions
Key features of open source Single Sign-On (SSO) solutions are crucial not only for understanding their functionality but also for assessing their applicability in varying contexts. In this segment, the discussion will center on three pivotal aspects: authentication and authorization, user management capabilities, and integration with existing applications. Each of these elements plays a significant role in the overall effectiveness of SSO systems, addressing the needs of both IT professionals and business stakeholders.
Authentication and Authorization
Authentication and authorization serve as the foundation on which open source SSO solutions are built. Authentication refers to the process of verifying a user's identity, while authorization determines the permissions granted to that verified user. These two processes are intrinsically linked, and their effectiveness is paramount for secure system operation.
An effective open source SSO solution must support multiple authentication methods, such as username-password, OTP, and even biometric options. This flexibility allows organizations to meet diverse security requirements.
The implementation of standardized protocols, such as OAut and OpenID Connect, facilitates more secure communication between applications and identity providers. This also allows for ease of integration with various systems, streamlining user access across multiple platforms.
"A strong authentication and authorization mechanism is essential for protecting sensitive data and maintaining compliance with regulations."
Additionally, these features contribute directly to user experience. Users appreciate the seamless access to applications without repeated logins, minimizing frustration and enhancing productivity.
User Management Capabilities
User management capabilities are another critical aspect of open source SSO solutions. These functionalities include the ability to create, update, and delete user accounts, as well as manage roles and permissions.
Robust user management allows organizations to enforce policies that control access based on roles. This feature is instrumental in ensuring that only authorized individuals can perform specific actions within an application. Furthermore, features such as self-service password reset, account lockout policies, and real-time notifications provide additional layers of security and convenience.
When evaluating open source SSO solutions, it is essential to consider their capacity to handle large user bases efficiently. Scalability is a key consideration for organizations that anticipate growth or deal with fluctuating user counts.
Integration with Applications
Integration with existing applications is a significant advantage of open source SSO solutions. The ability to connect with various platforms is fundamentally important, as organizations often utilize multiple tools and systems. A thorough understanding of integration methods can save valuable time and resources during deployment.
Open source SSO solutions often employ APIs and support microservices architecture, facilitating smooth communication between applications. Additionally, many solutions offer plugins or modules for popular enterprise applications, which enhance ease of implementation.
With seamless integration, organizations can ensure that end users have a consistent experience across different applications while maintaining centralized control over access management.
In summary, key features of open source SSO solutions—authentication and authorization, user management capabilities, and integration with applications—are essential for building secure, scalable, and user-friendly systems. Organizations considering open source SSO should evaluate these features closely to align their choice with their specific requirements.
Popular Open Source SSO Solutions
The importance of exploring popular open source Single Sign-On (SSO) solutions lies in understanding how they can simplify authentication processes for both users and organizations. SSO allows users to access multiple applications with a single set of credentials. This can greatly enhance user experience by reducing the number of passwords they must remember and manage. Furthermore, as organizations increasingly adopt cloud-based services, the need for efficient and secure authentication mechanisms becomes essential.
By investigating well-known open source SSO tools, organizations can find solutions that fit their unique needs. These tools can offer considerable advantages over proprietary systems, such as transparency, flexibility, and community support. The discussion here will focus on four key solutions: Keycloak, Gluu Server, Authentik, and WSO2 Identity Server.
Keycloak
Keycloak stands out as one of the most popular open source SSO solutions available. It provides comprehensive identity and access management features. Keycloak supports both SAML and OpenID Connect protocols, making it versatile in its applications.
Features of Keycloak include:
- User federation: Integration with existing user databases and directories is seamless, offering broader user control.
- Identity brokering: This allows users to log in with existing accounts from third-party identity providers like Google or Facebook.
- Customizable login pages: Organizations can tailor the user interface to match their branding.
Its robust feature set attracts many projects, but it can require some technical expertise for successful implementation and management.
Gluu Server


Gluu Server offers a sophisticated platform for managing identity, security, and SSO capabilities. It supports multiple protocols, including OAuth 2.0, OpenID Connect, and SAML. Gluu is designed with scalability in mind, which makes it ideal for organizations of various sizes.
Key capabilities include:
- Multi-factor authentication: Enhancements security during the login process.
- Dynamic Client Registration: This allows applications to register automatically with the Gluu Server.
- Identity API: Allows developers to interact with user data programmatically.
Various client applications integrate smoothly with Gluu, making deployments flexible and adaptable.
Authentik
Authentik is relatively new but is gaining traction due to its modern approach to identity management. Its design focuses heavily on user experience while maintaining strong security protocols. The solution itself is simple to deploy and manage.
Notable features include:
- Intuitive user interface: Helps both administrators and end-users navigate easily.
- Modular architecture: This allows organizations to add only the necessary functionalities for their needs.
- Support for various authentication flows: Supports everything from traditional username/password to two-factor authentication.
Some companies favor Authentik for its ease of use and quick setup.
WSO2 Identity Server
WSO2 Identity Server is comprehensive and designed to provide a broad range of identity and access management functionalities. Its versatility extends to supporting SSO solutions for various organizations, big or small.
Key aspects of WSO2 Identity Server include:
- Scalable architecture: Suited for enterprises handling large volumes of users.
- Comprehensive API Management: Offers strong capabilities for securing APIs in addition to application SSO.
- Identity provisioning: Automated processes help manage user identities effectively.
The breadth of features can be appealing, but the initial configuration may require time and expertise.
Understanding these solutions empowers organizations to streamline access management, improve security, and enhance user experiences across their applications.
Implementation Challenges and Considerations
When organizations consider adopting open source Single Sign-On (SSO) solutions, they encounter a range of implementation challenges and considerations. Understanding these elements is crucial, as they directly affect the success of the integration process. Properly addressing these challenges can ensure seamless user authentication and efficient management across various applications.
Technical Complexity
Implementing an open source SSO solution often involves navigating significant technical complexity. First, IT teams must possess a deep understanding of identity management practices. This knowledge is essential, as SSO requires not only configuration but also integration with existing systems. Training staff to manage these systems effectively is a vital component of the implementation process.
Additionally, the complexity increases when considering various protocols and standards associated with SSO. Protocols such as SAML, OAuth, and OpenID Connect are commonly used but can be difficult to configure correctly. Misconfigurations may result in security vulnerabilities or data access issues. Engaging experienced developers or consultants can help mitigate these risks.
Security Risks
Security concerns are paramount when choosing to implement an open source SSO solution. The centralization of authentication can create a compelling target for attackers. If compromised, unauthorized access to multiple applications can occur, leading to data breaches. It is crucial for organizations to conduct thorough risk assessments to understand potential vulnerabilities.
To enhance security, organizations should focus on implementing best practices, such as regular updates and patches. Outdated software can harbor security flaws that attackers may exploit. Furthermore, employing multi-factor authentication adds an additional layer of protection. Organizations should ensure that their SSO solutions are compliant with relevant regulations, which can also safeguard user data and company assets.
Maintenance and Support
Another challenge that organizations face is the ongoing need for maintenance and support. Open source projects may lack the formal support structures found in commercial solutions. Thus, organizations must be ready to invest time and resources into troubleshooting and maintaining their SSO systems. This includes monitoring system performance and quickly addressing any issues that arise.
Support can also come from the community surrounding the open source project. However, the quality and responsiveness of community support can vary widely. Organizations should evaluate the size and activity of the community for the specific SSO solution being considered. This grassroot support can sometimes supplement formal support, but reliance on it should be weighed carefully.
Adopting an open source SSO solution can yield significant advantages, but challenges exist that organizations must confront. Technical complexity, security risks, and the need for maintenance all require careful consideration. By understanding these factors, organizations can better navigate the implementation landscape and make informed decisions about their SSO strategies.
Benefits of Adopting Open Source SSO Solutions
Open Source Single Sign-On (SSO) solutions offer various advantages for organizations of all sizes. These benefits stretch from cost efficiency to extensive customization, ultimately affecting user access management and security protocols. By delving into the reasons for adopting such systems, this section underscores their importance and relevance in practical applications.
Cost-Effectiveness
Adopting open source SSO solutions can significantly lower costs for businesses. Traditional licensing fees associated with proprietary software often escalate quickly, especially for larger organizations. In contrast, open source alternatives eliminate the need for such costs since they typically do not require initial purchase fees.
By choosing solutions like Keycloak or Gluu Server, organizations have the potential to avoid ongoing expenses. The maintenance and development costs can also benefit from community contributions, reducing the burden on in-house resources. In this regard, integrating open source SSO not only saves financial resources but can also streamline IT budgets, thus allowing for more investment in other critical areas of the business.
Flexibility and Customization
One prominent appeal of open source systems is their flexibility. These solutions allow for extensive customization, enabling organizations to tailor functionalities according to their specific needs. This adaptability can be essential for meeting unique requirements within organizational workflows or industry standards.
For instance, businesses might want to integrate SSO with their existing infrastructure seamlessly. Open source platforms grant access to source code, making it possible for developers to modify and adapt the solution thoroughly. This flexibility also promotes rapid innovation, leading organizations to respond quickly to evolving business needs. In a world that prioritizes agility, the option to customize without barriers is invaluable.


Collaborative Community Support
Another critical aspect of open source SSO solutions is the robust community that backs them. An engaged community offers a wealth of resources, including documentation, troubleshooting forums, and real-time guidance. This collaborative nature fosters an environment of shared knowledge and best practices.
Moreover, regular updates and improvements emerge from community contributions, ensuring the software stays relevant and secure. Organizations that leverage systems like Authentik or WSO2 Identity Server benefit from this extensive support network. As members of a collaborative community, users can also provide feedback, enhancing the overall quality of the solution.
"The strength of open source lies in its community engagement; thus users not only consume but also participate in the creation and improvement of software solutions."
In summary, the benefits of adopting open source SSO solutions encompass multifaceted advantages, including cost savings, flexibility, and community support. These elements collectively contribute to a more efficient, customizable, and secure user management system.
Integration with Existing Systems
Integrating open source Single Sign-On (SSO) solutions with existing systems is a critical aspect for organizations looking to streamline user authentication and improve security. This integration is vital as many businesses rely on a combination of legacy applications, modern systems, and cloud services that require seamless access management. Understanding how open source SSO can interoperate with these diverse environments will help organizations leverage their existing investments while enhancing security protocols.
The foremost benefit of such an integration is the simplification of the user authentication process. When users can access multiple applications using one set of credentials, it not only improves their experience but also reduces the risk of password fatigue. This is particularly beneficial in environments with multiple user interfaces requiring authentication.
However, there are specific considerations organizations must take into account before implementing integration. Here are some key points:
- Assessment of Current Infrastructure: Organizations need to evaluate their existing systems and identify compatibility with the selected open source SSO solution. This analysis includes understanding user directories, database management systems, and associated authentication protocols.
- Security Protocols: It is crucial to ensure that adequate security measures are in place during the integration process. This includes implementing secure communication channels and verifying user identities to prevent unauthorized access.
- Scalability: Integration plans should account for future growth and scalability. As businesses evolve, their authentication needs may shift, requiring flexible solutions that can adapt to changing needs.
- User Training: Employees and IT staff must be trained on the new system to ensure a smooth transition. Organizations should facilitate this process by providing clear documentation and support resources.
"Integrating current systems with open source SSO can significantly enhance security and usability, but careful planning is needed to succeed."
Overall, successful integration with existing systems is about aligning technological strengths with business goals. For organizations aiming to modernize their identity management framework, focusing on compatibility with legacy systems and the inherent challenges of varied technologies is essential. Without a clear strategy, organizations may face hurdles that could thwart their efforts to enhance security and streamline user management.
Compatibility with Legacy Systems
Legacy systems often pose a challenge when integrating modern solutions like open source SSO. These older applications may lack support for current standards or protocols used in contemporary identity management. When planning integration, organizations should carefully consider the following:
- Middleware Solutions: Implementing middleware can facilitate communication between the legacy systems and the SSO platform.
- Custom Connectors: Building custom connectors can help bridge gaps, allowing older applications to utilize modern authentication methods.
- Incremental Upgrades: In some cases, it may be beneficial to upgrade legacy systems incrementally, allowing for phased integration with open source SSO solutions.
APIs and Microservices Architecture
APIs (Application Programming Interfaces) and a microservices architecture are essential components of modern software development. They play a significant role in the integration of open source SSO solutions with existing systems. By utilizing APIs, organizations can facilitate communication between services without needing to overhaul their entire system. Some advantages include:
- Modular Design: This allows for independent updates and scaling of individual components, enabling organizations to adapt quickly as their needs change.
- Faster Integration: With defined APIs, organizations can integrate new features and services without significant downtime or disruption.
- Enhanced Flexibility: Microservices allow organizations to deploy solutions in a way that suits their operational requirements, enhancing overall system responsiveness.
In an era where digital transformation is paramount, ensuring that open source SSO solutions are compatible with both legacy systems and modern architectures like microservices is crucial. Doing so enables businesses to maintain a cohesive and secure user experience across their software landscape.
Future Directions for Open Source SSO
The landscape of Single Sign-On (SSO) solutions is perpetually evolving. Open source paradigms within this space offer unique opportunities for customization and adaptability. Understanding the future directions of open source SSO is crucial. As organizations increasingly shift to cloud-native architectures, they face new identity management challenges. Therefore, developing open source solutions will be essential in addressing these challenges effectively.
Trends in Identity Management
Several critical trends are shaping identity management today. Firstly, decentralization is gaining traction. Users now demand more control over their identity data. Technologies like decentralized identity (DID) are allowing personal information to be managed privately. Open source SSO projects are adapting to incorporate such technologies, promoting user agency.
Moreover, privacy-focused frameworks are emerging. Regulations like GDPR have heightened awareness regarding data privacy, compelling SSO developers to prioritize user data protection. Open source solutions can easily adapt to such regulations, providing transparency in data handling. This responsiveness aligns with current trends, ensuring that systems do not merely comply but also foster trust.
In addition, the integration of multi-factor authentication (MFA) is becoming standard practice. Users expect stronger security measures. Open source SSO solutions that incorporate MFA can alleviate these concerns effectively, ensuring robust invulnerabilities against unauthorized access. This trend pushes developers to implement advanced cryptographic techniques and improved user interfaces for ease of use.
Some might argue that there is a shift toward AI-driven identity management. With the rise of artificial intelligence, processes like authentication and fraud detection are becoming more sophisticated. Open source SSO systems leveraging AI can enhance real-time detection of anomalies, thereby increasing security while maintaining an intuitive user experience.
Emerging Technologies and Their Implications
Emerging technologies play a pivotal role in the evolution of open source SSO solutions. One highly influential factor is blockchain technology. Its ability to create immutable records offers enhanced security in identity management. Open source projects utilizing blockchain can provide an additional layer of trust by ensuring that identity data cannot be tampered with. This capability is becoming increasingly attractive for organizations handling sensitive information.
Another technology on the rise is biometric authentication. Users show a preference for biometric methods, such as fingerprints or facial recognition, for security due to their convenience. Open source SSO solutions integrated with biometric technologies will likely improve user engagement and streamline authentication processes. However, this also raises concerns about data privacy and management, which must be addressed with well-defined protocols.
Furthermore, cloud computing advancements are making scalable identity solutions more feasible. Trendy open source SSO solutions will increasingly integrate seamlessly into cloud infrastructures. This integration is vital for organizations aiming for flexibility and scalability.
Another aspect is the interoperability between different identity management solutions. Open standards and protocols promote smoother transitions between systems, making it easier for organizations to adopt and integrate open source SSO solutions. Consequently, this flexibility enhances the overall user experience and broadens adoption across enterprises.
End
The final section of this article serves as a significant reminder of the value held in open source Single Sign-On (SSO) solutions. As organizations continue to grapple with ever-evolving authentication needs, understanding the potential of open source SSO can lead to more secure and efficient user management. The clear benefits we have discussed include cost savings, customization, and community support. Each of these elements are crucial to modern identity management strategies.
Summary of Insights
In this article, we explored the fundamental concepts surrounding open source SSO. We detailed key features that distinguish these solutions, such as authentication protocols and user management capabilities. Furthermore, we highlighted well-known platforms like Keycloak and Gluu Server, while also examining the challenges faced during implementation, including technical complexity and security risks.
The myriad of advantages offered by open source SSO solutions enhances their attractiveness. By adopting these systems, organizations can implement more flexible and tailored user authentication experiences. Among the notable insights, the collaborative nature of open source software provides a unique advantage that proprietary systems often lack.
Recommendations for Organizations
For organizations considering the shift to open source SSO, several recommendations emerge from our analysis. Firstly, it is imperative to conduct a thorough assessment of existing systems. Understanding current architecture and user requirements will inform the selection process.
- Evaluate different open source platforms based on compatibility and feature set.
- Prioritize training and upskilling of IT teams to handle the complexity of implementation.
- Foster community engagement to leverage collaborative support and shared resources.
- Implement thorough security protocols to address any vulnerabilities that may arise during integration.