Enterprise Single Sign-On (SSO)

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Exploring authentication methods: How to develop secure systems

    Use this guide to discover authentication options and learn how to implement, maintain and secure several methods of authentication, such as biometrics, single sign-on (SSO) and smart cards to avoid security breaches and protect sensitive corporate a... 

  • Enhanced Identity and Access Management

    From consolidating directories to automating provisioning and rolling out single sign-on, these sessions identify how leading organizations are strengthening authorization and enforcing access controls. 

  • Secure user authentication: Regulations, implementation and methods

    When deploying any authentication option -- whether to comply with the FFIEC's two-factor authentication mandate or simply strengthen access controls -- businesses need to weigh several factors to decide which option best suits their needs. In this l... 

  • Authenticating Windows

    Three options for Windows authentication with eSSO clients. 

  • Identity and Access Management Services, Systems and Technologies

    Government regulations and the convenience of federated identities have made identity management and access control a priority for many enterprises. This Identity and Access Management Services, Systems and Technologies Security School explores criti... 

  • XML Web services tutorial: How to improve security in Web services

    Securing XML is an essential element in keeping Web services secure. This SearchSecurity.com Learning Guide is a compilation of resources that review different types of XML security standards and approaches for keeping your XML Web services secure. 

  • Spy vs. Spy

    Excerpt from Chapter 6 of Spies Among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day. 

  • SAP Security Learning Guide

    This guide pulls SAP security information from both SearchSecurity.com and its sister site, SearchSAP.com, to provide the most comprehensive resource around for all aspects of making your SAP system bulletproof. 

  • Infosec Know IT All Trivia: Authentication

    Test your knowledge of authentication methods with our Infosec Know IT All Trivia. 

  • Sun launches open source OpenSSO for identity management

    Sun integrates access management, federation and secure Web services in its new OpenSSO Enterprise 

  • Startup Symplified delivers SSO in the cloud

    Mid-sized enterprises lack the money and expertise to implement identity management for Web-based services. Startup Symplified is banking on the software-as-a-service (SaaS) model as a solution. 

  • Kerberos security evolves for B2B, mobile tech

    Kerberos is a dominant authentication protocol, embedded in Windows, Solaris and multiple Linux flavors. But with new threats and new technology, an upgrade is in order. 

  • IBM acquires Encentuate for single sign-on software

    In a move to bolster its identity and access management capabilities, IBM has announced its acquisition of Encentuate, Inc., a private company in Redwood City, Calif. 

  • Security360: Identity management market

    Analyst Mark Diodati describes the leaders of the identity management market; IBM's Joe Anthony explains Big Blue's strategy and Novell's Dale Olds on user-centric identity. 

  • Top 10 access-related controls for PCI compliance

    Companies that identify, monitor, report and investigate audit trails and conduct risk analytics are taking the right steps to protect critical data, according to one expert. 

  • Flaws fixed in widely-used Kerberos program

    MIT has fixed a pair of flaws in its widely-used Kerberos program attackers could exploit to cause a buffer overflow and run malware on targeted machines. 

  • Oracle builds identity suite with Bharosa acquisition

    Oracle's acquisition of Bharosa Inc. fills a key hole in Oracle's security lineup and could eventually pit it against EMC's RSA security division and IBM's Tivoli , according to experts. 

  • Integration migration

    Today John Swainson, president and chief executive officer of CA, will be making his first keynote speech at an RSA conference. Since joining CA in 2004, John has focused the company on its core strengths of systems, network, security and storage man... 

  • Looking ahead to life without passwords

    Security pros know that passwords are nothing but trouble. For them, single-sign on, two-factor authentication and federated ID represent the path to stronger authentication. 

  • See more News on Enterprise Single Sign-On (SSO)
  • single sign-on (SSO)

    Single sign-on (SSO)is a session/user authentication process that permits a user to enter one name and password in order to access multiple applications. 

  • onboarding and offboarding

    In identity management, onboarding is the addition of a new employee to an organization's identity and access management (IAM) system. The term is also used if an employee changes roles within the organization and is granted new or expanded access pr... 

About Enterprise Single Sign-On (SSO)

Enterprise single sign-on (SSO) technologies can help reduce help-desk calls and user mistakes by consolidating credentials into one single password for all applications and services. Read the news and technical advice here to find deployment strategies and practical advice.