2015-10-25 12:49:40 UTC

When evaluating Single Sign-On, what aspect do you think is the most important to look for?


Let the community know what you think. Share your opinions now!

Guest
1111 Answers
User

The ability to support the cloud solution is the most important aspect I’m looking for.

2019-07-18 06:03:43 UTC18 July 19
Real User

Simplicity and tight level of security.

2017-03-24 03:27:11 UTC24 March 17
Consultant

The Identity and Access Management market is still defining itself in terms of products, services and sellers. While, like in any industry, there are already market leaders, newcomers, and niche players, not all vendors (even the top ones) here offer everything possible that all organizations might need. Exercising discernment in the selection of a seller and/or a technology here is of extreme importance.

Here are 3 simple tips for evaluating an IAM vendor:

1. Be aware of who you are and what your needs are. Match vendors based on this information.
2. Look for quality delivery of the core functionalities that are essential to you.
3. Ask about implementation times, procedures and for case studies.

2018-09-20 11:54:52 UTC20 September 18
Vendor

As the wording kind of gives away, Single Sign On makes sure a user has to log in to only one application after being automatically logged into others. The number 1 advantage of SSO is that it eases the log in experience by taking away the unnecessary friction. When evaluating vendors of SSO, one must consider the following three elements: the CAS server, a client web browser (where a cookie is to be installed) and the web application requesting for authentication.

2018-09-17 08:14:49 UTC17 September 18
Real UserTOP 20LEADERBOARD

Security and the user experience. It needs to really be seamless.

2018-02-10 23:00:41 UTC10 February 18
User

security, MFA and support for legacy systems.

2017-12-20 16:43:15 UTC20 December 17
VendorTOP 20

security, user experience, TCO (deployment effort and simplicity ).

2017-12-13 11:20:01 UTC13 December 17
Real User

Security, Security, Security!!! I prefer not to use it as too many variables can be at play. You have to count on other companies security. This audit can be very complex, not accessible to 'outsiders', so it's usually unverifiable. A company's word isn't good enough.

2017-07-09 17:40:48 UTC09 July 17
ConsultantTOP 10

Organizations should consider what standards the solution supports and whether they are the standards the organization needs.

Important informations

Compatibility with legacy systems is the most important criterion in this case.
Check the ability to centrally manage passwords.
Integration with biometric data, smart cards and other two factor authentication systems.
Simplified compliance requirements without compromising employee productivity.

Thank you very much

2017-03-06 15:46:49 UTC06 March 17
Consultant

SSO solution must provide a single sign-on platform for disparate systems. SSO solution must support:
i) Kerberos
ii) Lightweight Directory Access Protocol
applications
iii) Pluggable Authentication Module (PAM)
iv) Name Service Switch (NSS)
v) Security Support Provider Interface (SSPI)

2016-02-16 11:08:45 UTC16 February 16
User

SSO is a session/user authentication process that permits a user to enter one name and password in order to access multiple applications. The process authenticates the user for all the applications they have been given rights to and eliminates further prompts when they switch applications during a particular session.

2015-11-23 14:21:43 UTC23 November 15
Find out what your peers are saying about Okta, Keeper, CA Technologies and others in Single Sign-On (SSO). Updated: September 2019.
365,533 professionals have used our research since 2012.
Sign Up with Email