Virtual True Single Sign-On

virtual true single sign-on

Single sign-on has been around for a while. However, the concept of single sign-on has morphed over the years to be less about one identity connecting your users to everything that they need, and more about exceptions outside of the Microsoft Active Directory® world. Now, there is a new concept of virtual True Single Sign-On™ that is embracing the philosophy of having one identity for access to all critical IT resources – and one centralized place for admins to manage that access.

Evolution of SSO

active directory alternative

The approach with SSO has really mimicked what has been going on in the IT landscape. The idea of SSO wasn’t even really talked about in the early 2000s when Active Directory emerged, but it was there. Microsoft’s idea of connecting you to your IT resources was two-fold: one, they needed to all be Windows-based, and two, they needed to be on-prem. Users would log in to their Windows device, and via the domain controller have access to whatever on-prem Windows resources they were authorized for. While we didn’t call it SSO, the process fit the definition of SSO: one set of credentials to access everything.

This model dominated the enterprise – for a while. Back in 2000, Microsoft owned 97% of the market share of devices [Forbes]. Just that number alone speaks volumes to the control Microsoft had. Unfortunately for Microsoft though, the IT landscape started to shift. Web applications started to become more popular. Cloud infrastructure rose to be the preferred choice for server infrastructure. On top of that, Mac and Linux devices began to overtake Windows machines on-prem. All of these changes had a major impact on the industry. In fact, by 2010, Microsoft only owned 20% of the device market [Forbes]. This was the death knell for the “Original SSO” – and it opened the door for a wave of solutions that sought to add on to Active Directory to complete the SSO picture.

The Second Edition of SSO

cloud device management directory service

Of course, the plethora of new cloud-based IT resources and non-Windows devices were outside of the scope of Microsoft’s (Read more...)

*** This is a Security Bloggers Network syndicated blog from JumpCloud authored by Jon Griffin. Read the original post at:

Jon Griffin

Jon Griffin works as a writer for JumpCloud, an organization focused on bringing centralized IT to the modern organization. He graduated with a degree in Professional and Technical Writing from the University of Colorado Colorado Springs, and is an avid learner of new technology from cloud-based innovations to VR and more.

jon-griffin has 169 posts and counting.See all posts by jon-griffin