Month: January 2016
Effective Single Sign–On (SSO) solutions are in many ways similar to baking a cake. You need several key ingredients mixed together in a certain way and heated in just the right manner in order to get a refined and tasty final product. The Security Assertion Markup Language (SAML) is one of those key ingredients for password management, and arguably one of most important ones.
SAML Authentication provides a standard for transmitting authentication information between organizations. Specifically, SAML provides the capability for users to access resources from entirely separate domains using their own credentials. It’s the glue or the binding that allows effective password managers provide one point of access to an end-user who wishes to navigate through several different back-end networks.
SAML authentication is often used to help a service provider’s clients access hosted applications, like your Yahoo email or retail virtual environment. Assuming that within this retail virtual environment your provider has a virtual shopping cart in a domain separate from the inventory network, SAML can help provide the end-user with access to both capabilities without needing to authenticate two times.
In Human Resources, SAML can provide a fast way to onboard new employees after an acquisition by providing access to both company networks via a single authentication point. Last but not least, in Healthcare, SAML can help unite external healthcare providers to deliver critical applications to patients through a single source of authentication.
Ultimately, SAML adds another layer of flexibility to address the ever-changing environment of modern business.Read More
Managing the identity and access privileges of users on your network and IT systems is essential to cybersecurity. Hypersocket Software corporates a suite of ID and access management tools that provide a common user experience and enable organizations to enforce least privilege policies for remote users.
It can automate tasks and make resources available in real-time, enabling collaboration and sharing to an extent not before possible. The emergence of cloud services and increasingly powerful mobile devices are extending these capabilities beyond enterprise perimeter, making the IT system a productivity tool for employees and partners not only in the office, but anywhere in the world. However, unlike most powerful tools, this is a double-edged sword. Remote access to online resources can effectively negate perimeter defences and extend the domain of the insider threat worldwide.
This makes managing identity and the access privilege of users even more essential to cybersecurity. Systems need to be able to authenticate the identity of users, and in some cases also the devices being used for accessing together with the location and type of networks being used. Only then can access privileges be securely granted, based not only on identity, but also the user’s role in the organization and the circumstances of the connection. An employee connecting to a system during business hours over a secure network might be given wider privileges then when connecting from the other side of the world in the middle of the night, for instance.Read More