IT Management  >   Systems Operations  >   Security  >   AAA  >   Authentication  >  

SSO

RSS Feed   
ALSO CALLED: Single Signon, Enterprise Single Sign-on, Single Sign On, Single Sign-on
DEFINITION: Single sign-on (SSO)is a session/user authenticationprocess that permits a user to enter one name and password in order to accessmultiple applications. The process authenticates the user for all theapplications they have been given rights to and eliminatesfurther prompts when they switch applications duringa particular session.
SSO Reports
1 - 25 of 51 Matches Previous Page  |  Next Page
SSO in the Cloud and Mobile Era
sponsored by Techtarget
RESOURCE: Single sign-on has always appeared to be the best option for log-in security, however, as use of the cloud increases and the BYOD trend continues to grow, additional protection is necessary to keep data protected. We're offering free access to one of our expert guides, SSO in the Cloud and Mobile Era.
Posted: 02 Apr 2021 | Published: 02 Apr 2021

Techtarget

Showdown: Okta vs. Active Directory
sponsored by Okta
DATA SHEET: You’re moving towards Office 365 and you want true single sign-on for users. You also want to ensure authentication is directly tied back to the policies and user status in Active Directory. Read on to learn how you can get both.
Posted: 05 Mar 2021 | Published: 05 Mar 2021

TOPICS:  SSO
Okta

Showdown: Okta vs. Active Directory
sponsored by Okta
WHITE PAPER: You’re moving towards Office 365 and you want true single sign-on for users. You also want to ensure authentication is directly tied back to the policies and user status in Active Directory. Read on to learn how you can get both.
Posted: 04 Mar 2021 | Published: 04 Mar 2021

TOPICS:  SSO
Okta

Secure on-prem web apps with Okta
sponsored by Okta
VIDEO: In this webinar, see in real life how Okta – and Okta Access Gateway – can secure access to on-prem web apps.
Posted: 04 Mar 2021 | Premiered: 04 Mar 2021

TOPICS:  SSO
Okta

UBM
sponsored by Okta
CASE STUDY: Find out how Okta formed the foundation of UBM's standardization project of all technology infrastructure to ensure the security of all of their platforms, whilst helping them to simplify the authentication process for internal users so they have a more seamless experience.
Posted: 24 Feb 2021 | Published: 24 Feb 2021

TOPICS:  SSO
Okta

Funding Circle UK
sponsored by Okta
CASE STUDY: Funding Circle started with a cloud-first strategy, but in order to fully embrace the cloud, the financial service needed a reliable and scalable identity solution. Tap into this webpage for all the details on how the UK's Funding Circle saw identity management success with Okta.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

TOPICS:  SSO
Okta

Bazaarvoice
sponsored by Okta
CASE STUDY: Bazaarvoice, a SaaS based company that creates a network between brands and retailers, was facing many security challenges. They needed to meet regulations and laws across various countries, as they were storing very sensitive PII. View this full webpage of videos and resources to learn how Bazaarvoice saw success after partnering with Okta.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

TOPICS:  SSO
Okta

Go Beyond the Limitations of Multi-Factor Authentication to Protect Your Data
sponsored by Atakama
RESOURCE: As network environments become more complex, layered approaches to checking user credential, like multi-factor authentication (MFA) become “bulky” and inconvenient. Read this article to see why organizations are transitioning away from MFA towards single sign-on (SSO) approaches to access management.
Posted: 10 Dec 2020 | Published: 25 Jun 2020

Atakama

Identität as a Service für Dummies
sponsored by Okta
EGUIDE: According to the Okta 2020 “Businesses @ Work” report, the average number of apps per organization is currently 88, and the growth rate over the past 3 years has been 21 percent. Using this helpful guide, learn how companies are leveraging IDaaS to make IAM more scalable, more flexible and more cost effective.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Okta

Looking for a PeopleSoft ‘Quick Win’? Integrate SAML for Single Sign-On (SSO)
sponsored by Appsian
RESOURCE: Resetting passwords can quickly put a strain on IT help desk services. In fact, hackers know that passwords are being reset at a record pace, as demonstrated by the massive uptick in phishing attempts (+667% since Feb. according to Forbes.) Discover the 4 reasons why PeopleSoft customers should prioritize single sign-on today.
Posted: 27 Apr 2020 | Published: 27 Apr 2020

Appsian

Evaluating a PeopleSoft Single Sign-On (SSO) Solution
sponsored by Appsian
DATA SHEET: Discover six questions to ask a potential SSO vendor and why they’re important for PeopleSoft customers.
Posted: 03 Mar 2020 | Published: 03 Mar 2020

Appsian

Simple, Secure SAML Authentication in PeopleSoft
sponsored by Appsian
DATA SHEET: Learn how Appsian’s PeopleSoft SSO Connector provides a SAML integration layer between PeopleSoft, your enterprise SSO (OKTA, Ping, Identity, etc.) and your IdP.
Posted: 03 Mar 2020 | Published: 03 Mar 2020

Appsian

A Computer Weekly buyer’s guide to perimeterless network security
sponsored by ComputerWeekly.com
EGUIDE: Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
Posted: 16 Dec 2019 | Published: 16 Dec 2019

ComputerWeekly.com

ACT.md Sees 2x Dev Savings With Auth0
sponsored by Auth0
RESOURCE: To serve patients well, providers need fast and secure access for a wide variety of health and government institutions, each with different ways of verifying identity. In this case study, learn how ACT.md was able do so using Auth0.
Posted: 30 Apr 2019 | Published: 30 Apr 2019

Auth0

A Computer Weekly buyer's guide to perimeterless network security
sponsored by ComputerWeekly.com
EGUIDE: Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
Posted: 05 Feb 2019 | Published: 05 Feb 2019

ComputerWeekly.com

Single Sign-On Service Requires a Cloud-Era Update
sponsored by SearchSecurity.com
EBOOK: The best Single Sign-On today can handle the applications mobile workers use, identity as a service and more. In this guide, learn how you can make SSO and other identity management approaches more effective.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

SearchSecurity.com

Making Sign-on Simple and Secure
sponsored by SearchSecurity.com
EBOOK: Single sign-on (SSO) has a complicated history but this technical guide can bring you up to date quickly on how the main protocols for SSO - OpenID and Security Assertion Markup Language (SAML) - compare and how they can be connected to the pieces you already have.
Posted: 13 Mar 2015 | Published: 13 Mar 2015

TOPICS:  Security | SSO
SearchSecurity.com

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

IDC 2014 WW MarketScape Report for Federated Identity Management and SSO
sponsored by IBM
WHITE PAPER: Find out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.
Posted: 08 Oct 2014 | Published: 31 Mar 2014

IBM

How to Properly Move into the Cloud
sponsored by Forum Systems
EGUIDE: This e-guide will help you avoid SSO land mines in the cloud by taking an in-depth look at authentication principals, authentication providers, authentication consumers, and more. Read on as experts also highlight how to handle a cloud provider decrypting customer data, even without encryption keys.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Forum Systems

Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER: This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

BitGlass

Evaluating File Sync and Share Security
sponsored by Dropbox for Business
WHITE PAPER: This white paper outlines the twelve questions you need to ask vendors to ensure you're getting the most secure file sync and share service possible.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

Dropbox for Business

Can a Federated Identity Service Strengthen SSO?
sponsored by Radiant Logic, Inc.
WHITE PAPER: With the challenge of identity silo, user overlap, and heterogeneous sources, you need a single access point to access identities from across the infrastructure
Posted: 04 Jun 2014 | Published: 31 Dec 2013

Radiant Logic, Inc.

Managing identities and access in the cloud
sponsored by IBM
WHITE PAPER: This white paper highlights the top identity and access management features needed for cloud deployments to ensure secure collaboration.
Posted: 06 May 2014 | Published: 31 Dec 2011

IBM

Eagle Bank Keeps Deposits and Customer Data Safe
sponsored by Imprivata
WHITE PAPER: This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata
1 - 25 of 51 Matches Previous Page    1 2 3    Next Page
Browse by Report Type:
SSO White Papers | SSO Multimedia | SSO IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences