Single Sign-On

Single Sign-On
By combining the convenience of single sign-on with granular access policies, organizations can tighten access controls, and reduce password fatigue–the cumulative exhaustion experienced by many due to the ongoing need to create, remember, update and reset an excessive number of passwords on a daily basis. By validating identities, enforcing access policies and applying Smart Single SignOn, organizations can ensure secure, convenient access to numerous cloud applications, and reduce management overhead by centrally defining and enforcing access controls from one easy-to-navigate console.
Its Benefits:
1) Fast and easy cloud access through Smart Single Sign-On
2) A single pane of glass for centralized user access control
3) Optimized security through fine-grained access policies
4) Visibility into all access events for simplified compliance
5) Secure access for partners and contractors
6) Identity-as-a-service efficiencies
Core Capabilities
Smart Single Sign-On
Smart Single Sign-On lets users log in to all their cloud applications with a single identity, eliminating password fatigue, frustration, password resets and downtime.
In this way, users may authenticate just once in order to access all their cloud applications, or provide additional authentication as configured in the policy.
Scenario-based Access Policies
Fine-grained access policies let you define which users can access which apps, using which authentication methods, as well as define conditions under which user access should be denied. Policies can be defined to balance between security and usability considerations, and can be customized per compliance mandate, user group, or cluster of applications.
Extensive Authentication Options
Context-based authentication enhances user convenience by assessing contextual parameters to determine whether a login attempt is secure. When a login attempt is considered secure, the user is granted immediate access. When it is not considered secure, a broad range of additional authentication methods are available.