CATEGORIES

Single Sign On

Reducing the attack surface for identities and entitlements in the cloud

  The attack surface is the number of all possible points, or attack vectors, where an unauthorized user can access a system and extract data. The smaller the attack surface, the easier it is to protect. Organizations must constantly monitor their attack...

Simplifying cloud access with SSO

As enterprises adopt cloud applications, users are plagued with password fatigue--the never-ending burden of creating and maintaining separate identities and passwords for the multiple cloud and web apps they need to access on a daily basis. Adding to the frustration...

Three ways to succeed with Single Sign On

Password Sync: Is the simplest solution implemented by Soffid to succeed with the SSO, connecting the different identity databases via sync servers and assuring via manual or automated reconciliations that, all the ID’s are in full sync. Standard protocols: Soffid...

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

Simplifying cloud access with SSO

Simplifying cloud access with SSO

As enterprises adopt cloud applications, users are plagued with password fatigue--the never-ending burden of creating and maintaining separate identities and passwords for the multiple cloud and web apps they need to access on a daily basis. Adding to the frustration...

Three ways to succeed with Single Sign On

Three ways to succeed with Single Sign On

Password Sync: Is the simplest solution implemented by Soffid to succeed with the SSO, connecting the different identity databases via sync servers and assuring via manual or automated reconciliations that, all the ID’s are in full sync. Standard protocols: Soffid...