BEST PRACTICES
How Single Sign-On (SSO) Authentication Works
Single sign-on (SSO) authentication works through the use of different protocols depending on the type of resource you need to access.
Single sign-on (SSO) authentication works through the use of different protocols depending on the type of resource you need to access.
Single sign-on (SSO) has been a popular tool since the mid 2000s, but SSO is not complete identity and access management (IAM). Learn why.
JumpCloud is an official Identity Provider (IdP) for AWS SSO identity management via our SCIM integration.
True SSO should describe exactly what the name implies – the ability to leverage a single set of credentials to sign on to various resources.
Using JumpCloud's Cloud LDAP, admins can authenticate users to their MySQL databases from the cloud with simplicity.
Hardware-based attacks are becoming more commonplace, can bypass most authentication and endpoint security systems.
Phishing is incredibly common and tricky. Learn how to prevent phishing damage by implementing SSO, MFA, and organization-wide policies.
As startups consider identity management, there are certainly questions to consider. Often, organizations ask about SSO vs AD.
Learn why multi-factor authentication is a pillar of Zero Trust and how to leverage it in your organization.
The days where employees sat at workstations and interacted exclusively with native applications are gone but not forgotten: the legacy […]
Multi-factor authentication is now considered an essential security measure for organizations, but how effective is MFA?
As organizations shift to entirely distributed work models, IT admins need to set up MFA to keep users secure. Find out how to do so from the cloud.