InfoSec-Specific Executive Development for
CISOs and Aspiring Security Leaders.
Live Faculty-led instruction and interactive
labs to build you and your team's InfoSec skills
Single sign on (SSO) tools offer many of the same SSO features and capabilities, but where they differ is in their overall stability, integration and ease of troubleshooting/support. This piece outlines issues to watch for when choosing an SSO provider,
as well as guidance for how to proceed.
When discussing identity, the topic often shifts to technology choices available – SAML vs. OAuth, AD vs. Ping vs. Okta, etc. However, the ultimate goal for any of these projects is to allow users to authenticate to a number of different systems
using a standard set of credentials and, once authenticated securely, gain access to a number of resources, whether those resources are all controlled by the same infrastructure or not. Federation is, at its core, a user experience project in which
the technology selected will – for the most part – be entirely transparent to users.
Selecting technology for SSO projects is particularly challenging because the technology selection process and user experience process do not directly align. For example, the technology selection must also address potential failure modes because when
a federation project fails, it results in users being unable to log in, not to just a single system, but to all systems.
When selecting a tech tool, consider three core areas:
Regardless of the decision your organization decides to go in, keep in mind the wider implications and evaluate more than the SSO feature set to ensure the change doesn’t adversely impact the business in the long run.
Although reasonable efforts will be made to ensure the completeness and accuracy of the information contained in our blog posts, no liability can be accepted by IANS or our Faculty members for the results of any actions taken by individuals or firms in connection with such information, opinions, or advice.
May 19, 2022
By IANS Faculty
Understand potential security risks for executives on social media. Find information on attack trends and guidelines to help identify potential attacks and keep both social media accounts and the organization secure.
May 17, 2022
Learn how to make progress with zero trust, including common zero trust use cases, success stories, tooling guidance and tips for effectiveness.
May 12, 2022
Gain an understanding of the role executives play in incident response (IR). Find guidance on key actions to take before, during and after a security incident.