Universal SSO: Strategies & Standards for Single Sign-on Across Web and Native Applications
- LANGUAGE: English DATE: Thursday, October 15, 2015 TIME: 2:00pm CEST, 1:00pm GMT
Many organizations have had some form of Web Access Management solution deployed for years. Whether this is pure-play Web Access Management, providing Web Single Sign-On capabilities and coarse-grain Access Management, or more advanced technology including Web Application Firewall functionality, one target is to manage access of employees and business partners to these applications.
With the steadily increasing number of apps a user needs to be productive in his job, not having an SSO solution in place that covers both native and web applications is increasing risk and adds complexity to the user´s experience.
The Key takeaways from this webinar are:
- Mobility is causing a sharp rise in the usage of native apps
- Oauth 2.0 for native app authorization
- OpenID Connect as the Identity Layer for native apps
- Introduction into the NAPPS model
In the first part of the webinar Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, talks about the different approaches to achieve single sign-on across web and native apps, available standards and recommended deployment models.
In the second part Pamela Dingle from Ping Identity will give an insight into best practices for how the benefits of Universal SSO can delight your end users and make your business faster and more efficient.
New Penderel House, 8th Floor, 283-288 High Holborn • WC1V 7HP London • United Kingdom
Phone: +44 207 190 9105
Ping Identity is The Identity Security Company. Ping Identity believes secure professional and personal identities underlie human progress in a connected world. Our identity and access management platform gives enterprise customers and employees one-click access to any application from any device. Over 900 companies, including 45 of the Fortune 100, rely on our award-winning products to make the digital world a better experience for hundreds of millions of people. Visit pingidentity.com for more information.
IT endpoints are no longer just workstations and servers confined to corporate headquarters, branch offices, customer sites, and data centers, they can now be just about anything located anywhere, from employee homes to airports, hotels and in the cloud. But every endpoint represents a potential entry point for cyber attackers, and needs to be managed.