Single Sign-on (SSO) is an authentication mechanism that allows a user to log in with a single user credential to multiple web applications (cloud or on-premises) and sites.

How Single Sign-On Works?

Single Sign-on is based on the concept of federated identity management in which one or more applications (service provider) have a trust relationship set with an SSO service (identity provider). When a user signs in to one of the applications the SSO service provider will check whether the user has already signed in. If an authentication token is available, then the same will be shared with the application. If not, a new token will be shared with the application. When the user tries to log in to any other application that has a mutual trust established with the SSO service, then they are automatically granted access. SSO is achieved through protocols like OIDC, OAuth, and SAML 2.0.

sso image

SSO service need not necessarily store the user credentials. Most SSO services validate the user credentials against a separate identity management service like Active Directory (AD) or LDAP or other Identity Providers.

CyLock SSO uses Microsoft Active Directory Federation Services (ADFS) which is part of the Microsoft Windows Server OS to provide Single Sign-On services to on-premises applications. Cloud services like O365 and Google Workspace can be enabled with SSO through the on-premises ADFS setup.

CyLock SSO can be used by enterprises, financial institutions, and governments to eliminate the need for managing multiple credentials for its user and customers.

SSO Security

On top of strong password policies, organizations can enable CyLock MFA to provide a more secure SSO process within the organization. MFA can provide security against cyber-attacks thereby safeguarding enterprise identity and data.

Benefits of SSO

  • Enforce strong and realistic password policies.

  • Eliminate the need to manage multiple passwords.

  • Boost user productivity as they need to remember fewer passwords and sign in once.

  • Defend against cyber-attacks.

  • Reduced IT help desk calls for a password reset.

  • Better visibility, tracking, and control of applications by the IT team.

Shape Shape

Use The Best Product to Protect your Application

Start Free Trial House Image