SSO (Single Sign-On), or Multi-Factor Authentication, is an integrated authentication feature that allows use of various resources with just one-time authentication.
In the existing environment, users should log in to the computer at the company, log in to applications such as groupware, log in to the application installed on another server, and then log in to a web service such as Cloud Office.
With multi-factor authentication, users can use all resources with just a one-time login in a secure way. For the administrator, it is more convenient to set the privilege by service or change the authentication policy, providing the management cost-saving effect.
There are various SSO or multi-factor authentication packages on the market. But deployment of an SSO package should be made by comparing the specifications, deployment costs, and maintenance costs of each product. Consider the following:
Interoperability between required elements and maintenance convenience
First, deploying an SSO requires various elements, such as a DB server, a policy server, and management tools. Interoperability between the elements and maintenance convenience should be considered before deployment. In some cases, convenience provided by the SSO may be smaller than the effort to maintain it.
Single Sign-On User Environment Support
A single sign-on (SSO) product should support all operating systems and browsers in various user environments without any limitations. In addition, various authentication means should be provided, including certificates and biometric information, as well as ID/PW. Compliance with various standards including FIDO is necessary to provide strong authentication and security for the enterprise and make it easier for users to access the business-critical applications they need.
Generally, it takes significant time and money to deploy an SSO. In addition, due to system complexity, in some cases the SSO should be implemented again one or two years after its initial implementation. Whether or not to change the existing application should be considered because of additional labor costs.
Ultimately, the point of an SSO is security. A non-interruptive operation and stable backup system in case of a failure should be considered as well.
Recently, a package that integrates all software for SSO, such as the SSO authentication server, the DB server, the policy server, the management tools, and the monitoring tools, has been developed.
Penta Security offers ISign+, a comprehensive SSO solution with the enterprise in mind.
ISign+ comes with several features and components required for SSO all built into a hardware appliance. This minimizes deployment costs as well as spending for maintenance and upkeep. It can be used as needed after implementation. Clients can have a safe and convenient SSO solution available for use within a week of deployment.
In addition, ISign+ can be expanded beyond SSO to meet demands for today’s IoT environment such as integration into Physical Access Control Systems (PACS). ISign+ will work with several other technologies to provide robust authentication for handling personnel access using devices, ID cards, biometrics, and various other tools.