SSO Easy provides your company with secure access to IBM Connections Cloud, while enabling authentication via Active Directory, or via countless other login sources, while leveraging SAML 2.0. Employees can access IBM Connections Cloud with just one click following their initial login to Active Directory, or any other authentication source. Administrators can control and easily manage who has access to IBM Connections Cloud. SSO Easy's IBM Connections Cloud Single Sign-On (SSO) solution with the desired authentication integration, while leveraging SAML 2.0, is easy-to-use and fast to deploy, with free setup and support.
Users log in once, allowing them to launch IBM Connections Cloud and numerous other web apps with a single click of a link. Single sign-on helps employees save time, prevents lost or forgotten passwords, and reduces the risk of password phishing for your organization.
International Business Machines Corporation (commonly referred to as IBM) is an American multinational technology and consulting corporation, with corporate headquarters in Armonk, New York. IBM manufactures and markets computer hardware, middleware and software and offers infrastructure, hosting and consulting services in areas ranging from mainframe computers to nanotechnology.
Security Assertion Markup Language 2.0 (SAML 2.0) is a version of the SAML standard for exchanging authentication and authorization data between security domains. SAML 2.0 is an XML-based protocol that uses security tokens containing assertions to pass information about a principal (usually an end user) between a SAML authority, named an Identity Provider, and a SAML consumer, named a Service Provider. SAML 2.0 enables web-based authentication and authorization scenarios including cross-domain single sign-on (SSO), which helps reduce the administrative overhead of distributing multiple authentication tokens to the user. By using SAML 2.0, organizations can be more competitive in their market, by moving faster than competitors. Organizations who leverage SAML 2.0 can be less prone to be hacked, to experience a security breach, or experience or a data breach, by leveraging SAML 2.0.
SSO Easy is the world leader in cloud based Identity and Access Management (IAM) solutions. SSO Easy's flagship product - EasyConnect - is deployed in production by thousands of clients, enables secure and seamless Single Sign On for millions of users, who access thousands of SaaS services and internal applications. Among countless implementation options which exist for deploying EasyConnect, SSO Easy customers can enable Single Sign On with Active Directory integration, using SAML 2.0, quickly and easily, and the solution is extremely cost-effective.
Free Trials are available -- typically completed in less than 1 hour.
Active Directory (AD) is a directory service that Microsoft developed for Windows domain networks. It is included in most Windows Server operating systems as a set of processes and services. Initially, Active Directory was only in charge of centralized domain management. Starting with Windows Server 2008, however, Active Directory became an umbrella title for a broad range of directory-based identity-related services. A server running Active Directory Domain Services (AD DS) is called a domain controller. It authenticates and authorizes all users and computers in a Windows domain type networkÛÓassigning and enforcing security policies for all computers and installing or updating software. For example, when a user logs into a computer that is part of a Windows domain, Active Directory checks the submitted password and determines whether the user is a system administrator or normal user. Also, it allows management and storage of information, provides authentication and authorization mechanisms, and establishes a framework to deploy other related services: Certificate Services, Federated Services, Lightweight Directory Services and Rights Management Services. Active Directory uses Lightweight Directory Access Protocol (LDAP) versions 2 and 3, Microsoft's version of Kerberos, and DNS.