IT Central Station is now PeerSpot: Here's why

Top 8 Single Sign-On (SSO) Tools

Azure Active DirectoryFortinet FortiAuthenticatorFronteggAuth0CyberArk IdentityLastPass BusinessKeeperManageEngine Password Manager Pro
  1. leader badge
    The best feature is the single sign-on provision for the various type of users.The performance is good.
  2. FortiAuthenticator is easy to use. We have not had issues with Fortinet FortiAuthenticator. It is stable.
  3. Buyer's Guide
    Single Sign-On (SSO)
    June 2022
    Find out what your peers are saying about Microsoft, Fortinet, Frontegg and others in Single Sign-On (SSO). Updated: June 2022.
    607,127 professionals have used our research since 2012.
  4. It has Audit Log and many cool features that if we were to develop them by ourselves, it would require a lot of research and development resources. Frontegg gives us everything we need to ensure that our customers have a safe and reliable authentication system in which they can also manage some of the features and roles by themself which gives them more control over their environment.
  5. It's a very powerful platform. It has the ability to do the usual stuff, according to modern protocols, like OIDC and OAuth 2. But the real benefit of using the platform comes from its flexibility to enhance it with rules and, now, with what they call authentication pipelines. That is the most significant feature, as it allows you to customize everything regarding the authentication and authorization process.
  6. The initial setup is straightforward. It takes me up to an hour and a half. The most valuable features of CyberArk Identity are its ability to control access to administrative staff.
  7. One feature that is really important to us is the ability to create secure notes.It is easy to use.
  8. report
    Use our free recommendation engine to learn which Single Sign-On (SSO) solutions are best for your needs.
    607,127 professionals have used our research since 2012.
  9. I like a couple of things about this solution. Being able to share passwords with other people is valuable. You can see if the information is out on the dark web and whether you have weak passwords and the last time they were changed. You could also have the 2FA or MFA codes embedded in the application so that you don't have to use your phone or any other 2FA device, which is something very important.
  10. The security provided is very enhanced and it does a great job of keeping passwords safe.It is very safe and we haven't had any security issues.

Advice From The Community

Read answers to top Single Sign-On (SSO) questions. 607,127 professionals have gotten help from our community of experts.
Netanya Carmi - PeerSpot reviewer
Netanya Carmi
Content Manager
PeerSpot (formerly IT Central Station)
Apr 02 2022

How did you decide to implement it and was it the right decision?

Janet Staver - PeerSpot reviewer
Janet StaverBeing able to log in to applications, websites, and other systems just one time… more »
2 Answers

Single Sign-On (SSO) Articles

Netanya Carmi - PeerSpot reviewer
Netanya Carmi
Content Manager
PeerSpot (formerly IT Central Station)
Jun 03 2022
PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to better connect with peers and other independent experts who provide advice without vendor bias. Our users have ranked these solutions according to their valuable features, and discuss which features...
Read More »
Janet Staver - PeerSpot reviewer
Janet Staver
Tech Blogger
May 31 2022
If you are like the majority of other companies, you most likely use cloud environments or multi-cloud implementations. Even though cloud computing has become increasingly popular, it introduces security threats such as contract breaches, compliance problems, and APIs that are not secure or are m...
Read More »
Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky
PeerSpot (formerly IT Central Station)
May 30 2022
Hi peers, This is our new bi-weekly Community Spotlight that includes recent contributions (questions, articles and discussions) by the PeerSpot community members.  Articles Check the top products and solutions below (selected based on peer reviews) or contribute your own article! ...
Read More »

Single Sign-On (SSO) Topics

How does single sign-on work?

A single sign-on (SSO) service involves an agent module sitting on the application server. When a user wants to access the network, the module retrieves the authentication credentials from a dedicated SSO policy server and compares them against a user repository. For example, a lightweight directory access protocol (LDAP).

The advantage of SSO is that it authenticates the user for all of the applications the user has rights to. This eliminates the need for signing in for each application during the same session.

At the base of SSO is the relationship between a service provider and an identity provider in the form of a certificate exchange. This certificate proves that the identity information comes from a trusted source. In an SSO, the identification data is inside a token.

The usual flow consists of the following steps:

  1. The user goes to the application or website they want to access (the service provider).
  2. The service provider sends a token containing information about the user (email, username, and password) to the SSO system (the identity provider) with a request to authenticate the user.
  3. The identity provider checks whether the user has been authenticated, and in that case, grants the user access to the application.
  4. If the identity provider hasn’t logged in before, then the system prompts the user to provide identity credentials. Sometimes it requires a username and password. Other systems give the option of a one-time password.
  5. Once the identity provider validates the credentials, a token is sent back to the service provider to confirm it was a successful authentication.
  6. The token received by the service provider then is validated and grants the user access.

Despite all of these steps, the authentication process happens in a matter of seconds.

What is an SSO token?

A token is a collection of identity information that goes from one system to another. A token may consist of a user’s email and password, and data about the system that is sending the information.

An example of a token is the way Google manages access to the products in G-Suite. Once you sign in to your Gmail, you get access to other applications, like YouTube, Google Drive, and Google Photos, without having to log in again for each app.

The token ensures you will gain access to multiple systems without needing to remember different credentials for each one.

What is the point of single sign-on?

SSO provides benefits in terms of security, customer experience, and reduced costs. The average organization uses an array of applications and services, both cloud-based and on-premises. A single sign-on helps to solve the tech sprawl by giving a single point of access.

In terms of security, SSO reduces the number of attack possibilities. User credentials are usually key targets for cybercriminals. The more credentials, the more opportunities for attackers to gain access. Single sign-on minimizes risk by requiring a single set of credentials.

SSO also helps with compliance, since many regulations require that organizations implement methods that protect data. SSO offers a way to effectively authenticate users who access electronic records as well as allowing for the automatic log-off of users.

Single sign-on also improves the employee’s experience. It saves time and improves productivity. Since most employees switch between an average of ten different apps for work, eliminating the need for signing in for each one saves considerable time and money.

SSO eliminates password fatigue and vulnerabilities. It also reduces the costs necessary to set up different help desks for resetting and management of passwords.

How is SSO implemented?

To implement an SSO in a central dashboard, you need two endpoints. One of the endpoints initiates an authentication request and redirects the user to a login form. The other endpoint accepts and receives the response, after a successful login process.

The data can be transferred from one entity to another by one of three methods:

  • HTTP redirect binding encloses the data by receiving a parameter.
  • HTTP post binding sends the data in the HTTP post request.
  • HTTP artifact creates a direct connection to each endpoint.
How does SSO work across domains?

Cross-domain single sign-on is a method for transferring user credentials across multiple secure domains. CDSSO allows the integration of multiple secure domains by enabling users to move between different domains with a single set of credentials.

A user can make a request to a resource located in another domain. The CDSSO transfers an identity token from the first domain to the second domain. Thus, the second domain can authenticate the user without the need for the user to provide new credentials.

The authentication flow for multiple domains is as follows:

  1. A user requests access to a resource in the second domain using a link in the first domain.
  2. The server processes the request in domain A, then sends an authentication token that states that the information comes from the first domain.
  3. The domain B server decrypts and validates the token, calling out a CDSSO authentication mechanism. The domain B authorization service allows or denies access to protected objects.
Buyer's Guide
Single Sign-On (SSO)
June 2022
Find out what your peers are saying about Microsoft, Fortinet, Frontegg and others in Single Sign-On (SSO). Updated: June 2022.
607,127 professionals have used our research since 2012.