InfoSec-Specific Executive Development for
CISOs and Aspiring Security Leaders.
Live Faculty-led instruction and interactive
labs to build you and your team's InfoSec skills
Single sign on (SSO) tools offer many of the same SSO features and capabilities, but where they differ is in their overall stability, integration and ease of troubleshooting/support. This piece outlines issues to watch for when choosing an SSO provider,
as well as guidance for how to proceed.
When discussing identity, the topic often shifts to technology choices available – SAML vs. OAuth, AD vs. Ping vs. Okta, etc. However, the ultimate goal for any of these projects is to allow users to authenticate to a number of different systems
using a standard set of credentials and, once authenticated securely, gain access to a number of resources, whether those resources are all controlled by the same infrastructure or not. Federation is, at its core, a user experience project in which
the technology selected will – for the most part – be entirely transparent to users.
Selecting technology for SSO projects is particularly challenging because the technology selection process and user experience process do not directly align. For example, the technology selection must also address potential failure modes because when
a federation project fails, it results in users being unable to log in, not to just a single system, but to all systems.
When selecting a tech tool, consider three core areas:
Regardless of the decision your organization decides to go in, keep in mind the wider implications and evaluate more than the SSO feature set to ensure the change doesn’t adversely impact the business in the long run.
Although reasonable efforts will be made to ensure the completeness and accuracy of the information contained in our blog posts, no liability can be accepted by IANS or our Faculty members for the results of any actions taken by individuals or firms in connection with such information, opinions, or advice.
September 29, 2022
By IANS Faculty
Understand the integration points between information security and enterprise architecture. Find guidance for functional organizational constructs to maintain a solid EA practice.
September 27, 2022
By IANS Research
Learn how to ensure full cyber insurance policy coverage and find 5 tips to help maximize your potential cyber insurance claims.
September 22, 2022
Find information on cyber insurance coverage types along with best practices to choose a cyber insurance carrier and policy for optimal security coverage.