By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Single-sign on (SSO) and federated identity News
July 12, 2017
Ping Identity CEO Andre Durand talks with SearchSecurity about the data-driven move toward contextual authentication and intelligent identity and what this means for enterprises.
June 02, 2017
News roundup: OneLogin security breach puts SSO data at risk but is vague about the details. Plus, Gmail boosts its phishing detection features, and more.
January 12, 2016
Researchers in Germany have found two OAuth vulnerabilities, which could allow attackers to break the authorization and authentication standard. And an expert said the fix must be made to the standard itself.
September 30, 2015
Skyhigh Networks' patented method for providing cloud access security broker services uses a reverse proxy mode to provide authentication and policy controls.
Single-sign on (SSO) and federated identity Get Started
Bring yourself up to speed with our introductory content
Kerberos is the authentication protocol used by most operating systems. Each time a Windows client logs into a corporate network, Kerberos is being used to authenticate access. Continue Reading
Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., name and password) to access multiple applications. Continue Reading
Enterprise SSO products have matured over the years, so what's the state of eSSO today? Expert Randall Gamby discusses. Continue Reading
Evaluate Single-sign on (SSO) and federated identity Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Security is critical in the cloud, so it isn't surprising that identity and access management services are in high demand. Learn why you need IAM, and what services to consider. Continue Reading
OpenID or SAML? These are but two choices you need to make when setting up SSO service for your enterprise employees. Learn what factors are at play in this crucial access decision. Continue Reading
Identity management technology is adapting to meet enterprise needs. Learn what products can improve security and ease compliance. Continue Reading
Manage Single-sign on (SSO) and federated identity
Learn to apply best practices and optimize your operations.
Single sign-on (SSO) has a complicated history filled with frustration and failure. Look at it just from a protocol point of view: OpenID, Security Assertion Markup Language (SAML), OAUTH, YAML, Shibboleth and so on. Of course some enterprises took ... Continue Reading
After a failed SSO implementation, is there any benefit to an enterprise trying again? Expert Michele Chubirka discusses. Continue Reading
Expert Randall Gamby details key strategies for SaaS access management and contemporary single sign-on technology that's truly interoperable. Continue Reading
Problem Solve Single-sign on (SSO) and federated identity Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Mobile apps using insecure OAuth could lead to over one billion user accounts being attacked. Expert Michael Cobb explains how developers can implement OAuth securely. Continue Reading
Network security expert Brad Casey advises how to mitigate the vulnerability in SSO product Atlassian Crowd until an upgrade can be performed. Continue Reading
Expert Randall Gamby discusses various types of single sign-on, specifically the approaches of Ping Identity's SSO and Symplified SSO. Continue Reading