Identity Management Category Web Application SSO

web application sso

For the last decade, one of the hottest categories in the identity management space has been web application SSO (single sign-on). With the changes that have been occurring in the IT landscape, this makes a lot of sense. Users are doing more and more work in the cloud, and SSO to web applications is a big part of making that work easier. Interestingly, though, there are now many IT admins looking to the horizon to see what’s next. Is there a solution that goes beyond the traditional identity management category web application SSO solutions? The answer is True SSO – the integration of single sign-on across virtually all of a user’s IT resources.

Precursor to True SSO from Microsoft

identity management active directory

In the past, the end user’s workflow was simple. All they needed to do was enter their username and password into their Windows® computer, and they would have access to just about everything they needed. This was because of Microsoft® Active Directory® and the domain controller. These IT tools enabled all of the Microsoft resources in the office to talk to each other, and as a result Microsoft effectively created the concept of single sign-on to all Windows resources without really articulating it that way.

This was a major feat. It made the end users life easy, and it made the IT admins life easy as well. This Microsoft approach worked so well because of the way enterprise technology looked at the time. Nearly the entire network was on-prem and Windows-based. From the systems to the applications, and the back office tools, just about all of it was from Microsoft. Active Directory and the domain controller required a homogenous local network to function as intended, and that’s exactly what the environment looked like then. In fact, that on-prem necessity is why companies with multiple locations would either have local domain controllers and AD servers, or would need to create VPNs to create the illusion of locality. This approach worked well for a number of years, and continues to work well in the enterprise environments that are (Read more...)

*** This is a Security Bloggers Network syndicated blog from JumpCloud authored by Jon Griffin. Read the original post at:

Jon Griffin

Jon Griffin works as a writer for JumpCloud, an organization focused on bringing centralized IT to the modern organization. He graduated with a degree in Professional and Technical Writing from the University of Colorado Colorado Springs, and is an avid learner of new technology from cloud-based innovations to VR and more.

jon-griffin has 48 posts and counting.See all posts by jon-griffin