Managed Single Sign-On (SSO)

Managed Single Sign-On

Over the last decade, single sign-on has become one of the hottest categories in IT. Many companies have come out of this space as big winners, with some going public and some being acquired. The focus of these successful organizations has always been web application single sign-on, but as time goes on, their solutions have just become a tack-on to Active Directory®. As a result, a need has developed for something more. Fortunately, a new managed single sign-on (SSO) platform is emerging, and it is connecting users to all different types of IT resources including systems, applications, file servers, and networks. To understand the need for this new managed SSO platform, it’s important we look at how the field has progressed.

The Beginnings of SSO

old office

The concept of SSO really started about 20 years ago with the massive adoption of the domain controller. The domain controller enabled admins to have more control over their IT network, as well as make it easier for end users to gain access to the tools they needed. As a result, admins were able to create a process where a user could login to the network once and gain access to virtually any IT resource on-prem. This setup became quite popular, and when combined with the management capabilities of AD the IT network became secure and easy to use. It wasn’t long until Microsoft became a monopoly in the space.

However, there was a catch with this setup. The SSO concept in this age was pretty limited to Microsoft solutions and on-prem resources. Within the IT organization’s walled garden of Microsoft technology, end users could log in to their machine and gain access to their Windows IT resources. Outside of this garden, users didn’t have as much luck without a VPN. Still, this setup worked at the time because the majority of offices fell into that type of environment. However, as we all know, nothing in technology stays the same for long.

New IT Means New SSO

managed Single Sign-On

As time went on, the all Microsoft and on-prem environment started to change. IT organizations started to (Read more...)

*** This is a Security Bloggers Network syndicated blog from JumpCloud authored by Jon Griffin. Read the original post at:

Jon Griffin

Jon Griffin works as a writer for JumpCloud, an organization focused on bringing centralized IT to the modern organization. He graduated with a degree in Professional and Technical Writing from the University of Colorado Colorado Springs, and is an avid learner of new technology from cloud-based innovations to VR and more.

jon-griffin has 88 posts and counting.See all posts by jon-griffin