CyberSolve

Single Sign-On

There can be only one… account for you to use to access all of your resources.

CyberSolve implements access management solutions as the security enforcement components of the Identity & Access Management (IAM) infrastructure. The access management component enforces access control against predefined security policies established to govern access to network resources.

Single Sign-On (SSO) is best described as a user experience. The idea behind the SSO experience is to allow the user or entity to navigate the application ecosystem without needing to provide credentials repeatedly. Usually, an existing authentication is trusted, and the user consumed, which then goes through typical authorization processes. 

SSO capabilities include a session/authentication process that permits a user or entity to enter one name and password in order to access multiple applications. SSO integrated applications support client authentication functionality for both internally and externally based applications and services enabling user/entity populations to seamlessly access integrated resources securely within a standard based authentication model. 

CLOUD-BASED SINGLE SIGN-ON

Open standard authentication and authorization (e.g. SAML, OAuth, OpenID Connect, etc.) based SSO allows users to sign on to all their Software as a Service (SaaS) applications (examples include ServiceNow, Google, and Dropbox) by trusting an authenticated session.  

The trusted authentication session sends a signed, encrypted message known as an assertion to the service provider. This allows the service provider to trust a shared, authenticated session because it came from a trusted source with the required organizational signature. 

What Makes Cloud SSO Tick?

  • A customizable SSO portal that provides users with one-click access to all of their SaaS applications from any browser or device

  • Basic or federated single sign-on

  • Quick, simple user provisioning and de-provisioning

  • Personalized options based on access policies

  • Granular security using any multi-factor authentication service

  • Reporting and usage metrics