Red Hat Single Sign On Overview

What is Red Hat Single Sign On?

Red Hat is the world’s leading provider of enterprise open source solutions, using a community-powered approach to deliver high-performing Linux, cloud, container, and Kubernetes technologies.

Red Hat Single Sign On is also known as Red Hat Single Sign-On, Red Hat SSO, RH SSO, RH-SSO.

Buyer's Guide

Download the Single Sign-On (SSO) Buyer's Guide including reviews and more. Updated: June 2021

Red Hat Single Sign On Video

Filter Archived Reviews (More than two years old)

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
SM
Solutions Architect at a tech services company with 1,001-5,000 employees
Real User
Top 20
It is very easy to scale and use as you want, but there could be more checks and balances to find out if there have been any security lapses

What is our primary use case?

We have our suite of applications and are using this product to integrate with most of the enterprise solutions or the identity providers solutions for authentication. Therefore, we are using it for authentication and single sign-on. For example, we are using the OpenID Connect protocol for authentication and receiving identity tokens from solutions. We wanted to test a single sign-on solution, which we can build up on, then later possibly provide as a solution to our customers. We started off with the community edition for our own uses. The community edition has an open source community, and… more »

Pros and Cons

  • "Red Hat SSO has a lot of very concise, well laid out documentation, which is available in the free edition as well."
  • "It is very easy to scale and use as you want."
  • "They could provide more checks and balances to find out if there have been any security lapses, e.g., if somebody is trying to break into the system. Some other products have these detection mechanisms in case someone is trying to hack into the system or find out a user's passwords."

What other advice do I have?

A costly product will not always save you from a security breach. SSO provides good protection at a low cost.
Product Categories
Single Sign-On (SSO)
Buyer's Guide
Download our free Single Sign-On (SSO) Report and find out what your peers are saying about Red Hat, Auth0, Ping Identity, and more!
Quick Links