Single Sign-On (SSO) Access Control

Written by Rajat Bhargava on March 29, 2016

Share This Article

IT organizations are searching for ways to tighten up their security while simultaneously making it easier for their users to be highly productive. Single Sign-On (SSO) access control is a key tool in that approach. As more of workers’ jobs are done online, securing and simplifying access is increasingly important. What’s the leading cause of security breaches? Compromised credentials due to poor password management. Single Sign-On approaches are aiding the fight for security and streamlining the authorization of employees.

Connecting Users and IT Infrastructure

It’s no secret that IT is at the center of organizations. Developers and operations personnel are creating more of the organization’s infrastructure than ever before. In some companies, the technical organization’s role is building the product, while in others it is supporting the sales and delivery of the product. There is a common thread, though. In all of these cases, users need access to more IT infrastructure now more than ever. Some of the infrastructure lives on-premises with their desktops, laptops, applications, and the WiFi network. Other portions of the IT network are located off-prem in the cloud. AWS and Google Compute Engine are the new data centers, and web applications are available for just about every function imaginable. The challenge is that all of these IT resources need to be connected to the user.

Disconnect from Web Single Sign-On Solutions

Web single sign-on solutions emerged several years ago to solve the problem of logging into web applications. These solutions connected to the on-prem directory service, and they were generally either Microsoft Active Directory or OpenLDAP. Users would leverage their directory services credentials to login to the SSO solution which would then federate identities to the web applications. Unfortunately, these solutions only worked on web applications and not on the systems, on-prem applications, and WiFi networks that users needed to access as well.

Call on DaaS for True SSO Access Control  

SSO access control should be inclusive of all IT resources and not just web applications. True SSO is achieved with the use of modern Identity-as-a-Service platforms such as Directory-as-a-Service (DaaS). DaaS serves as the modern, cloud-based directory service that connects users to whatever IT resources they need. This includes cloud-based servers, on-prem applications, web apps, networks, and Windows, Mac, and Linux systems. Connecting to all of these various resources requires a cloud identity service that leverages multiple protocols and is location agnostic.

If you would like to learn more about how to build SSO access control into your identity management strategy, drop us a note. We’d be happy to discuss it with you. Or feel free to give JumpCloud’s Directory-as-a-Service a try for yourself. Your first 10 users are free forever.

Continue Learning with our Newsletter