The principle is simple: The more resources people need access to, the more they need single sign-on (SSO). And it’s not just about making access convenient; it’s about making it secure. By enabling users to sign on once and have access to a growing number of resources, SSO reduces the effort required for access. At the same time, by reducing the number of access points (and all the easily compromised passwords that go with them), SSO reduces points of vulnerability. Here’s what to look for in SSO solutions to ensure your organization realizes the greatest benefit from SSO—in both convenience and security.

Single sign-on—but not single sign-on alone

SSO works best as part of a comprehensive, multi-faceted approach to identity and access management (IAM). For example, combining SSO with multi-factor authentication (MFA) and risk-based authentication can improve security by requiring additional authentication factors beyond the user’s SSO log-in.

Additional authentication based on level of risk

When MFA is combined with risk-based authentication, it not only improves security but also increases convenience. A risk-based approach means the user is required to step up to an additional factor of authentication only when the level of risk warrants it. That determination is based on who is requesting access, to what, from where and other variables.

A foundation of strong identity governance

A comprehensive approach that brings together MFA, SSO and identity governance is fundamental to delivering fully on the promise of access that is both convenient and secure. Identity governance enables policy-based access decisions, ensuring that SSO is governed by the organization’s established access management policies.

RSA: The ideal combination of modern authentication and identity governance for successful SSO

RSA includes SSO capabilities that provide users with a single web-based portal for accessing web and SaaS applications, mobile apps, VPNs and virtual workspaces. RSA SSO:

  • Enables users to log in everywhere with a single identity, and for administrators to manage access based on that identity
  • Validates access attempts based on user’s role, location, network and other factors, then makes policy-driven, risk-based authentication decisions in real time
  • Provides tested and certified technology integrations for SSO access to hundreds of applications and environments, plus open standards to support thousands more integrations
  • Makes it easy to populate the SSO portal with applications and other resources using web-based and SaaS connectors

Learn more about streamlining access for users and simplifying access management for administrators with RSA.

Subscribe to our Blog!

Subscribe to Blog