Over 283,583 professionals have used IT Central Station research.
Compare the best Single Sign-On (SSO) vendors based on product reviews, ratings, and comparisons.
All reviews and ratings are from real users, validated by our triple authentication process.
The total ranking of a product, represented by the bar length, is based on a weighted aggregate score.
The score is calculated as follows: The product with the highest count in each area gets the highest available score.
(20 points for Reviews; 16 points for Views, Comparisons, and Followers.)
Every other product gets assigned points based on its total in proportion to the #1 product in
that area. For example, if a product has 80% of the number of reviews compared to the product
with the most reviews then the product's score for reviews would be 20% (weighting factor) *
80% = 16. For Average Rating, the maximum score is 32 points awarded linearly based on our
rating scale of 1-10. If a product has fewer than ten reviews, the point contribution
for Average Rating is reduced (one-third reduction in points for products with 5-9 reviews;
two-thirds reduction for products with fewer than five reviews). Reviews that are more than 24 months old,
as well as those written by resellers, are completely excluded from the ranking algorithm.
The IT Central Station community agrees that the two most necessary requirements of single sign-on solution are security and widespread usability. Users said the solution should support SSPI (Security Support Provider Interface), computer network authentication protocols such as Kerberos, and PAM (Pluggable Authentication Modules) like OAuth 2.0, along with lightweight directory access protocol applications.
As a technical lead lead in Wipro, I am working with a team managing the identity and access for a secured environment for a banking client.
In total I have about 9 years of industry experience with Telecom and banking domains.
My niche is IBM Security Access Manager (WebSEAL) along with... more>>
• 20+ years of information technology experience, including twelve years of leadership/project management roles, in process analysis, software architecture, development, data modeling, implementation, infrastructure support and change control management. Analysis and design of medium to large... more>>
CISSP - Certified Information Systems Security Professional (ISC)² , certified IT security professional and having technological forte in the area of IDAM (Identity and Access Management) solutions, Federation , Web Services security, SOA and middle-ware security .
Worked extensively with... more>>
Results-driven digital consultant with expertise on Rapid Process digitization, Customer Experience and large scale agile solution development. Successfully delivered a number of high impact engagements for 'Banking/ Financial Services', 'Telecom' and 'Pharmaceuticals' clients.
A results-driven and customer-focused Software Engineer with 11+ years of IT experience. A Engineer with very strong understanding of IAM concepts and processes and experience in the design and/or architecture of complex security and IAM solutions as well as products.
Last 10+ years working in... more>>
Experienced Professional with a distinguished 16-year career in the IT Infrastructure Management Services Industry. Strong track record of successfully executing IT Projects with proven history of meeting schedule and business goals. Demonstrated ability to support business transformation aiming... more>>