{"id":12545,"date":"2021-11-17T09:00:39","date_gmt":"2021-11-17T14:00:39","guid":{"rendered":"https:\/\/www.jumpcloud.com\/?p=12545"},"modified":"2024-01-29T14:33:18","modified_gmt":"2024-01-29T19:33:18","slug":"sso-isnt-identity-management","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/sso-isnt-identity-management","title":{"rendered":"SSO Isn’t Identity Management"},"content":{"rendered":"\n
In the world of identity and access management (IAM), single sign-on (SSO)<\/a> continues to be one of the most popular tools used by organizations all over the world. There are approximately 15,000 SaaS companies in the United States alone \u2014 with thousands more in other countries (Statista)<\/a>. Based on this, it\u2019s safe to say there are more web-based applications available than IT admins and users know what to do with. It also explains the interest in SSO and identity management.<\/p>\n\n\n\n However, it\u2019s important to know the differences between SSO and IAM. SSO is one important subset of IAM, but it does not make for a complete IAM strategy on its own. Yet, many organizations only use single sign-on to connect end users to web applications in their IT environment and call it an identity management strategy, which is incorrect. If anything, it\u2019s a fragmented identity management strategy, and every resource aside from web applications is left unmanaged (or managed with different, unconnected solutions). Whereas, a complete IAM strategy involves understanding, controlling, and managing user identities and access to all IT resources holistically.<\/p>\n\n\n\n In this article, we\u2019ll discuss what SSO and identity management are and how SSO became a part of IAM. We\u2019ll also dive into what questions to pose to make an informed decision on whether your organization only needs SSO or if a more comprehensive IAM solution is needed, as well as what a modern, cloud-based IAM solution looks like.<\/p>\n\n\n Single sign-on is popular, and for good reason, but it doesn\u2019t quite live up to its name. Single sign-on sounds like<\/em> a tool that enables a user to access every resource they need via a single (successful) sign-on attempt. But this isn\u2019t actually the case \u2014 the first generation of single sign-on providers created SSO solutions that simply extended identities from a separate directory (typically Active Directory (AD), but could be any core directory service) to web applications. Therefore, we more aptly refer to these tools specifically as web app SSO<\/strong> tools, which describes exactly what they are. <\/p>\n\n\n\n Web app SSO is also seen as the equivalent of first generation Identity-as-a-Service (IDaaS)<\/a> solutions, which is another misnomer because these solutions don\u2019t own identities. Rather, the core directory that the web app SSO solution is layered on top of is what actually houses and manages identities. And, since web app SSO tools are typically layered on top of a directory, it means you\u2019ll need to purchase and manage multiple tools to make a solution like this work.<\/p>\n\n\n\n Identity management, or the more comprehensive term identity and access management<\/a>, ensures that users have access to only the IT resources that they need, and only after first being verified and authorized to do so. <\/p>\n\n\n\n It is too easy for bad actors to breach a user\u2019s identity, especially when it isn\u2019t managed well. Proper identity and access management is the key here, because it builds in security, oversight, and management of both identities and access.<\/p>\n\n\n\n You essentially have two options when it comes to IAM solutions:<\/p>\n\n\n\n Option 1: <\/strong>Manage a variety of tools that are layered on top of one another to handle each aspect of IAM. Keep in mind that this traditional approach often gets costly and out of hand if too many tools are added into the mix. These disparate tools can include:<\/p>\n\n\n\n Option 2: <\/strong>Manage a single comprehensive cloud directory platform<\/a> that functions as a complete cloud IAM solution. Use it to house and manage identities and access while implementing SSO to virtually all IT resources such as devices, networks, cloud infrastructure, legacy and web apps, physical and virtual file servers, and more! On top of that, enjoy MFA, PAM, conditional access policies, and much more, all included in the same modern platform.<\/p>\n\n\n\n Option 2 eliminates the need for on-prem infrastructure and a variety of point solutions while providing your organization with all of the capabilities you need with much more flexibility. It also has the advantage of eliminating the need for directory extensions (given the holistic, open nature of the platform to support multiple protocols, access requests, and resources) and password managers (given the fact that end users have a single set of credentials that consolidates access to virtually all IT resources, not just web applications). <\/p>\n\n\n\n Recent trends like certain IPOs, acquisitions<\/a>, and announcements in the IAM\/SSO industry have made it clear that major players care about this market, and that there\u2019s an active transition away from point solutions like web app SSO to comprehensive IAM solutions happening. This is primarily because single sign-on, especially web app SSO<\/em>, isn\u2019t a complete IAM solution; it\u2019s only one part of the greater strategy. A true IAM tool contains complete single sign-on capabilities, plus much more.<\/p>\n\n\n\n The disconnect between IAM and SSO happened in the same way that we\u2019ve seen over and over again, in pretty much every industry: <\/p>\n\n\n\n Web app SSO allows users to authenticate to web applications with one set of credentials, but they don\u2019t take into account access management regarding other important IT resources. You don\u2019t just log in to web apps at work \u2014 everyone has to sign-on to their device(s) and network(s) to just get started. Past that, they might log in to legacy on-prem apps, physical or virtual file servers, and other cloud infrastructure. Now the coverage of web app SSO seems pretty narrow in the grand scheme of things, right?<\/p>\n\n\n\n This is where a modern identity management tool comes into play. A comprehensive IAM platform allows IT to control identities and access levels from one central place. This means using one platform to provision and deprovision user access to virtually all relevant IT resources (not just web apps) regardless of protocol, store credentials, and to ultimately own identities. Putting in place a complete IAM solution eliminates the need for separate web app SSO tools altogether, providing you with more functionality and control within a single pane of glass.<\/p>\n\n\n\n One big issue with using a web app SSO point solution is the storage and synchronization of credentials. It\u2019s important to consider where these SSO providers<\/a> pull credentials from. If they house them, how do those credentials sync with what end users are using on-prem? Specifically, what credentials do they use when they access their laptop or desktop, internal WiFi network, internally hosted web applications, or their own servers? If they aren\u2019t in control of the user\u2019s credentials, as is the case with most web app SSO implementations, then they are reliant on a third party solution. That means integration, availability risk, and, of course, increased security risks.<\/p>\n\n\n\n Today\u2019s web app SSO solutions are largely based on SAML<\/a> \u2014 one of the standard protocols for web authentication and authorization. However, most internal resources are based on different protocols such as LDAP, Kerberos<\/a>, and RADIUS, which adds complexity to the lives of IT admins who want to securely and easily connect users to a wider variety of IT resources. A complete IAM platform should be able to handle and support a wide variety of protocols to ensure that users can successfully authenticate to whatever resource they need, regardless of protocol.<\/p>\n\n\n\n Lastly, the way most web application SSO<\/a> implementations work is that they sit on top of a directory and federate credentials to web applications. So, they can extend a user\u2019s credentials to web apps, but web app SSO providers don\u2019t necessarily own an identity. This is one reason why web app SSO solutions don\u2019t often act as core identity providers, and it\u2019s also the reason why SSO providers can\u2019t offer the same control and core identity management that a modern cloud IAM platform can. <\/p>\n\n\n\n The solution to all of this? Since the market itself is transitioning away from add-on web app SSO solutions to comprehensive IAM platforms, you should consider following suit within your organization. Doing so will improve security, productivity, and your bottom line when you cut out the hidden costs<\/a> that come with managing multiple systems, like a directory and separate, third-party SSO solution. A complete cloud IAM solution includes True Single Sign-OnTM<\/sup> capabilities, along with a variety of other features that improve organizational efficiency while simultaneously reducing risk.<\/p>\n\n\n\n Web app single sign-on solutions connect users to just one category of IT resources:<\/em> web applications, via a single set of credentials.<\/p>\n\n\n\n The modern version of single sign-on, or what we call True Single Sign-On<\/a>, is <\/strong>the use of one set of secure credentials across virtually all IT resources<\/em> such as Mac, Windows, and Linux devices; web apps; legacy apps; networks; physical and virtual file servers; cloud infrastructure; and more.<\/p>\n\n\n\n True SSOTM <\/sup>is included as part of the JumpCloud Directory Platform<\/a>, meaning that all of the capabilities you need to establish and maintain a modern core IAM solution are contained in one cloud-driven platform. This eliminates the need for the use of multiple disparate tools to manage your IT environment, no matter what types of resources your users need to access.<\/p>\n\n\n\n Considering many organizations are still using first generation solutions like web app SSO and on-prem infrastructure like AD, we can see that there is quite clearly a disconnect between traditional web app single sign-on<\/em> and full identity and access management using True SSO<\/em>. It\u2019s important that this disconnect gets addressed to help organizations move forward and modernize their IT infrastructure to mitigate security risks and user productivity concerns.<\/p>\n\n\n\n When considering identity and access management solutions, start by asking yourself the following questions:<\/p>\n\n\n\n These questions are a good place to start because they will help you identify your needs and requirements. For organizations that are largely focused on cloud applications and don\u2019t care about devices or controlling users on those devices, then a web application single sign-on solution may suffice.<\/p>\n\n\n\n However, for organizations that are scaling quickly, housing sensitive data, interested in improving security, or simply planning ahead, their environment dictates a broader view of authentication and authorization. Further, those that are subject to compliance requirements<\/a> will not be able to meet the standards they are held to just through web application access control \u2014 all IT resources should be monitored and managed.<\/p>\n\n\n\n These organizations are interested in controlling access to devices, physical and virtual file servers, on-prem applications, cloud infrastructure, web applications, and networks, among other things \u2014 in short, a holistic approach to identity and access management. Their IT environment generally involves a mix of platforms, applications, and locations (on-prem and cloud). In these situations, a comprehensive directory platform is an appropriate choice.<\/p>\n\n\n\n With the modernization of the IT environment, the traditional concept of web app SSO isn\u2019t enough for many organizations, nor does it rival true identity and access management solutions.<\/p>\n\n\n\n The JumpCloud Directory Platform<\/a> functions as a core identity provider via the cloud that has built-in True Single Sign-On capabilities that allow users to seamlessly authenticate to virtually any IT resource. While this provides a great experience for end users, it also allows IT admins to gain higher visibility into the IT environment and control identities in a way that\u2019s secure and efficient.<\/p>\n\n\n\n Test out JumpCloud\u2019s modern, simplified IAM solution with True SSO, and see if it\u2019s right for your organization! Start a trial of JumpCloud<\/a> to access the entirety of the platform for free.<\/p>\n\n\n\n<\/figure><\/div>\n\n\n
What is SSO, Really?<\/h2>\n\n\n\n
What is Identity Management?<\/h2>\n\n\n\n
\n
What\u2019s the Difference Between SSO and IAM?<\/h2>\n\n\n\n
How Did IAM and SSO Come Together?<\/h3>\n\n\n\n
\n
Why Identity Management Is More Than Web App Single Sign-On<\/h3>\n\n\n\n
Credential Storage<\/h4>\n\n\n\n
Protocol Usage<\/h4>\n\n\n\n
Web App SSO Providers Don\u2019t Own Identities<\/h4>\n\n\n\n
What\u2019s the Difference Between Web App Single Sign-On and Modern True Single Sign-On?<\/h2>\n\n\n\n
Choosing an IAM Solution That Fits Your Needs<\/h2>\n\n\n\n
\n
<\/figure>\n\n\n\n
JumpCloud\u2019s Modern IAM and SSO Platform<\/h2>\n\n\n\n
Try JumpCloud\u2019s Solution Free<\/h3>\n\n\n\n