CA SSO Room for Improvement

Sr. Manager at Duroob
I think the future release is, if you ask me, I think they have done a lot in the new release, especially the front end. The front end was not as good. CA did a good job in doing it, especially when I look at the new identity suite. They have done a good job in changing the overall look and feel. This is actually what the customer was looking for. The look and feel was not good in the earlier product. It's a journey, so we just completed one of the requirements for the customer. CA has reporting at the moment. With the reporting, every particular segmented product has a reporting engine. I would like to see centralized reporting for all of them together. If an enterprise customer has all of these three or four modules for security, he will get consolidated reporting. A problem we had with the customer was, at the moment, we were asked, “Are you able to integrate these products together?” Were we able to get the requirement done for the customer, as a business requirement? The reporting side we were unable to do it out-of-the-box. If CA consolidates the reporting for all three together, it may be easier. I'm not sure, but it may be easier. View full review »
Design Engineer 5 at a financial services firm with 10,001+ employees
Better documentation. I went through some sessions on single sign-on for version 12.7. Whatever features we are looking for from a REST API perspective, they will be there. So far, it is good. We have to implement it, and figure out what is good or bad about it. There are a few other competitors which are taking up advantage over the segment being more agentless. SiteMinder is more driven with agent-based authentication, but the others are going with being more agentless. So, we have to go into the more next gen technology, where other vendors are going into, and that is where SiteMinder is lagging behind. The speed at which they are bringing up these features, it is very slow. View full review »
Software Engineering Consultant at a retailer with 10,001+ employees
I've talked to them about this: I'd like to see a rework of the user directory configuration. In Single Sign On, whenever you set up a new user directory, there is a pretty specific number of hoops that you have to jump through in order to maximize throughput between Single Sign On and a user directory. A lot of those aren't documented, so the only way you typically get that information is by engaging CA support, which, if you don't think you need to do that beforehand, you're going to have an unpleasant surprise when you cut over. So, either reworking the user directory configuration would be great, to make some of those hoops that you have to jump through unnecessary, or redundant. Or, failing that, reworking the documentation for setting up the user directory, explaining the rationale behind why you have to do the things you do. Because, if it were documented, at least then you'd be able to set it up effectively without incurring downtime, as you find out how to do it the right way. View full review »
Find out what your peers are saying about CA (A Broadcom Company), Okta, IBM and others in Single Sign-On (SSO). Updated: October 2019.
372,185 professionals have used our research since 2012.
Manager with 10,001+ employees
I think they need to integrate some of the newer types of authentication into the product. I'm not seeing the innovation when it comes to biometrics in the product. Also, easier integration with third-party partners to OpenID Connect because username/passwords are a thing of the past. People are going to be using facial recognition. Apple has gone that way. There are other companies like Daon that are doing this. CA SSO will be left behind if they don't have it yet. There's some innovation being done, but it's not there. Improvement is being made all the time. I just came out of a session here at the CA World conference where they showed how you set up Federation partners is being improved, through more APIs. Making life easier for the engineer is always important because we are lazy in general. So improvements are being made in that space. There's more to be done, like how to make configurations easier, and not have the engineer having to guess what will happen when he changes a particular setting. View full review »
Security Engineer at a financial services firm with 10,001+ employees
I would prefer to see their SAML integration be a more streamlined and easier interface, more like PingFederate's interface. Their product works just as well for that use case, but we do not use it, because it is a much larger learning curve to get it running. View full review »
Anil Gaddi
Security Architect at Raymond James Financial, Inc.
I would like to see a move towards the newer technologies, which is what we are doing right now. I think that's in the roadmap that's coming, in the 12.8 and 14 releases, but we would like to have it sooner than later. View full review »
Maurice Shorrosh
Technology Director at a financial services firm with 10,001+ employees
Better monitoring. A better way to debug a problem. When there is a problem with it, it should log enough information for CA to know what is the problem, like a better debugging tool. It needs better debugging and support. View full review »
Aseem Poudel
Senior Software Analyst at NRG Energy
We would like to the OAuth be more stable, more issues being fixed rather than not. We're pretty happy, but there are some scenarios with the new stuff, like OAuth - where authentication happens from Google, Amazon - in which they're still lagging right now. They're developing it, but we have been using SSO for a long time and Oauth capability was not there, and it recently started this year. So we had a little bit of a question, "Should we still use this product or we should go to another product?" That was the one concern. View full review »
Amlan Sahoo
Systems-Engineer at a tech services company with 10,001+ employees
* The GUIs are not very clear, especially when integrating with other products from CA. * Like CA IDM, there can be challenges. One needs to know that they have great hands-on on their app servers to understand the logic and deploy it accordingly. * There were challenges with version compatibility, and this is something that I did not like. This all happened during the second phase while trying out various integrations. View full review »
Syed Aamer
IT Security Consultant at NIC KSA
Maybe they could improve on the Federation part, and Federation with the apps. Not only for the websites, but with the apps also. View full review »
Site Minder Admin at a construction company with 501-1,000 employees
We're working on a mobile API gateway. I am really interested to learn more about that. View full review »
Rachid El Baraka
Systems Engineer at navyfederal
The OpenID Connect piece, we would like to see the new technologies baked into the product, as opposed to going out and using a different product to accomplish the same thing. So OpenID Connects would be great, to have that kind of plug-in, into SSL without having to go in and install new products. View full review »
Director at a logistics company with 1,001-5,000 employees
Answering this would require me to know what the current platform does or doesn't do, and I'm afraid I'm not a good enough judge to make that evaluation. I might say something and it's already there, and I just don't know about it. I will say the user interface for login is kind of plain. They could make it a little prettier. The site is a big, blue screen, with "SiteMinder," and that's pretty much it. View full review »
Infrastructure Manager at a government with 1,001-5,000 employees
I do not think there is anything to improve. It is a pretty complete product. View full review »
Find out what your peers are saying about CA (A Broadcom Company), Okta, IBM and others in Single Sign-On (SSO). Updated: October 2019.
372,185 professionals have used our research since 2012.
Sign Up with Email