New & Notable
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Single-sign on (SSO) and federated identity News
July 12, 2017
Ping Identity CEO Andre Durand talks with SearchSecurity about the data-driven move toward contextual authentication and intelligent identity and what this means for enterprises.
June 02, 2017
News roundup: OneLogin security breach puts SSO data at risk but is vague about the details. Plus, Gmail boosts its phishing detection features, and more.
January 12, 2016
Researchers in Germany have found two OAuth vulnerabilities, which could allow attackers to break the authorization and authentication standard. And an expert said the fix must be made to the standard itself.
September 30, 2015
Skyhigh Networks' patented method for providing cloud access security broker services uses a reverse proxy mode to provide authentication and policy controls.
Single-sign on (SSO) and federated identity Get Started
Bring yourself up to speed with our introductory content
In this excerpt from chapter 11 of Security Controls Evaluation, Testing, and Assessment Handbook, author Leighton Johnson discusses access control. Continue Reading
Kerberos is the authentication protocol used by most operating systems. Each time a Windows client logs into a corporate network, Kerberos is being used to authenticate access. Continue Reading
Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., name and password) to access multiple applications. Continue Reading
Evaluate Single-sign on (SSO) and federated identity Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The wrong move can make or break your enterprise mobility management implementation. Broad device support, automated enrollment and single sign-on are must-have features. Continue Reading
Bringing new application types and integration points into the enterprise, cloud can complicate user identity management. So, how can you be sure your data is secure? Continue Reading
Security is critical in the cloud, so it isn't surprising that identity and access management services are in high demand. Learn why you need IAM, and what services to consider. Continue Reading
Manage Single-sign on (SSO) and federated identity
Learn to apply best practices and optimize your operations.
A OneLogin data breach affected all of the company's U.S. customers after threat actors abused an Amazon Web Services API. Discover what this means for customers and SSO companies. Continue Reading
It's no secret that enterprise security and organizational productivity can often conflict. Peter Sullivan looks at the root causes and how to address the friction. Continue Reading
Single sign-on (SSO) has a complicated history filled with frustration and failure. Look at it just from a protocol point of view: OpenID, Security Assertion Markup Language (SAML), OAUTH, YAML, Shibboleth and so on. Of course some enterprises took ... Continue Reading
Problem Solve Single-sign on (SSO) and federated identity Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Mobile apps using insecure OAuth could lead to over one billion user accounts being attacked. Expert Michael Cobb explains how developers can implement OAuth securely. Continue Reading
Network security expert Brad Casey advises how to mitigate the vulnerability in SSO product Atlassian Crowd until an upgrade can be performed. Continue Reading
Expert Randall Gamby discusses various types of single sign-on, specifically the approaches of Ping Identity's SSO and Symplified SSO. Continue Reading