IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

Single Sign On

RSS Feed    Add to Google    Add to My Yahoo!
Single Sign On Reports
The Key to Seamless SSO: Building a Federated Identity Service
sponsored by Radiant Logic, Inc.
WHITE PAPER: This white paper explains why it's so difficult to deliver single sign-on that covers your entire portal, and also introduces a federated identity service that offers access to all sources of identity within your organization.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

Radiant Logic, Inc.

Identity and access amangement program implementation guidelines eGuide
sponsored by ForgeRock
EGUIDE: Examine best practices for successfully implementing an IAM strategy into your organization and overcoming the common challenges in this expert e-guide. Discover how to establish a strong foundation to align the strategy with the risk assessment of all apps/platforms.
Posted: 24 Nov 2015 | Published: 18 Nov 2015


Webinar: The Importance of Identity Management within an Office 365 Implementation
sponsored by Ping Identity Corporation
WEBCAST: Examine the pros and cons of each Microsoft Office 365 IAM approaches as well as a 5 question IAM self-evaluation guide to aid you in building your strategy. Discover the IAM requirements to secure access beyond Office 365 as well as third-party approaches that may bring you closer to your security goals.
Posted: 26 Oct 2015 | Premiered: Sep 30, 2015

Ping Identity Corporation

Protecting and simplifying access to Electronic Health Records
sponsored by DigitalPersona, Inc
WHITE PAPER: Studies show that 85% of healthcare facilities experienced data breaches in the past two years, at an average cost of up to $2 million each. In order to prevent such losses, many hospitals are deploying advanced security systems. In this whitepaper, find a security checklist that provides strategies every healthcare facility should be aware of.
Posted: 21 Jun 2011 | Published: 21 Jun 2011

DigitalPersona, Inc

Addressing Single Sign-On Inside, Outside, and Between Organizations
sponsored by Prolifics, A Premier IBM Business Partner
WHITE PAPER: This white paper examines how IBM Tivoli Unified Single Sign-On addresses the needs of organizations for enterprise single sign-on, Web single sign-on, and federated single sign-on.
Posted: 03 Aug 2010 | Published: 29 Dec 2008

Prolifics, A Premier IBM Business Partner

Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall
sponsored by PortalGuard
WHITE PAPER: Consult this informative white paper to find out how you can resolve issues with user-accessibility. Single sign-on can eliminate problems with multiple password prompts and make accessibility easier for the user. Learn why a single sign-on process can help handle an organizations multiple cloud applications as well as provide secure accessibility.
Posted: 13 Aug 2012 | Published: 13 Aug 2012


MarketScope for Web Access Management
sponsored by CA Technologies.
WHITE PAPER: This resource provides an insight to the market segmentation for WAM, as well as analysis of thirteen vendors in the market
Posted: 23 Jun 2014 | Published: 15 Nov 2013

CA Technologies.

Okta Active Directory Integration - An Architecture Overview
sponsored by Okta
WHITE PAPER: This white paper details a cloud-based identity and access management service that assists in the integration process from current on-premise applications.
Posted: 13 Sep 2013 | Published: 13 Sep 2013


Simplify Your Life - Eliminate Passwords
sponsored by PowerTech
WHITE PAPER: Learn how to implement Single Sign-On using IBM's Enterprise Identity Mapping (EIM) infrastructure, included in i5/OS and V5R2. Easily eliminate passwords to reduce costs, satisfy your auditors, and improve productivity.
Posted: 16 Apr 2007 | Published: 19 Jul 2005


Five Steps to Secure Internet Single Sign-On (SSO)
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper describes why and how any organization can implement secure Internet single sign-on, which provides for the portability and interoperability of identity information across organizational boundaries. Read this white paper to learn the five steps to secure internet single sign-on.
Posted: 05 Jun 2009 | Published: 05 Jun 2009

Ping Identity Corporation
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement