SlideShare a Scribd company logo
1 of 5
Download to read offline
WHITEPAPER
A Buyer’s Guide for Cloud Single
Sign-On (SSO)
Whitepaper
2
Table of Contents
Solution Architecture 3
Security Considerations 3
Compliance Requirements 4
Total Cost of Ownership 4
Business Fit 5
Whitepaper
3
A Buyer’s Guide for Cloud SSO
If your business relies on cloud applications, you’re probably considering single sign-on (SSO)
for those applications. After all, managing all of those passwords is a hassle for your business
– and not having control over cloud applications can be a real risk.
But what SSO solution do you choose? Does it have to be expensive and complicated? Can it
fit into your business? These are some of the questions that may keep you from moving
forward – that, and fear that you’ll be undertaking another major technology initiative.
This paper should help in your decision process. It offers guidelines for choosing a cloud SSO
solution that meets your business needs.
Solution Architecture
The first question to ask is the architecture question. Do you want to go old-school with on-
premise software? If you have existing Identity and Access Management (IAM) software in-
house, can you easily extend it to handle cloud applications? Or do you want to look to the
cloud for your cloud SSO solution?
> If you have an existing on-premise IAM solution, you may have options for extending it to
the cloud.
> A new generation of cloud-based SSO solutions, themselves delivered from the cloud,
offer the rapid deployment and low maintenance costs that you love about cloud
applications.
Security Considerations
Security is one of the biggest reasons people turn to cloud SSO, so be sure to look closely at
how the SSO solution handles the big issues:
> Data security in transit and at rest: How are your application credentials encrypted in
transit? How are they stored in the SSO application? Who can access those credentials
outside of your business? Who has access to the encryption key?
> Cloud application security: Does the solution give you control over application access?
For example, can you get people running without actually giving them the logins to your
Salesforce or HR applications?
> Phishing and identity theft protection: What kind of protection do you get from data
breaches or phishing?
> Two-factor authentication: Can you add a second factor to the SSO login so you don’t
rely on passwords alone? If so, what factors can you use?
Whitepaper
4
> SSO provider security: Take a close look at the vendor. What kind of industry standing
do they have? Does the data center hosting the service meet high standards for security
and availability? Can the provider’s employees ever access your credentials?
Compliance Requirements
If you’ve got people responsible for compliance, they’ll be interested in the security questions
above, as well as some of their own concerns:
> Audit/reporting: Can you audit all access to business applications? Is it easy to run
reports on access?
> Password policies: Can you set and enforce password policies for the individual
applications? For the SSO portal?
> Deprovisioning: When someone leaves, how quickly and completely can you remove their
access to business applications?
Total Cost of Ownership
No decision guide is complete without a consideration of total cost. Don’t look just at the
purchase (or subscription) cost. Consider the total cost of ownership.
> Subscription/licensing cost: If you’re looking at on-premise software, what are the one-
time licensing costs and ongoing maintenance costs? For a cloud-based solution, what is
the subscription model – per application, per user, some combination of the above?
Model your anticipated business and application growth against the subscription model to
determine actual pricing.
> Deployment cost: How much work will it take to implement the solution with your
existing applications? Are you going to need to hire expensive consultants to make it
work? Do you need to install any software on your own equipment? And how well will the
service provide support you during the deployment?
> Legacy or non-standard application costs: Are there extra costs associated with
supporting that home-grown application, or that strange app that your researchers love
and no one else uses?
> Training costs: How hard is it to use – are you going to have to train people? If so,
what’s the cost of training?
> Two-factor authentication: If the solution offers two-factor authentication, what factors
does it support? How much will it cost to outfit business users with the authentication
factors (tokens, cards, software)?
Whitepaper
5
> Administrative costs: How much administrator time does the solution require on a daily,
weekly and monthly basis? Who handles SSO password or authentication problems?
What’s involved in adding new users or removing access when people leave?
Business Fit
You’re probably interested in helping people be more productive. For that, you need to
understand how well the SSO solution fits your current business.
> Application fit: Does it work with the applications you use? Does it require a lot of work
to support custom or new apps?
> Directory integration: Can you link the SSO solution to your existing Active Directory (or
other directory). Directory integration gives you one place to manage user identities.
> Identity federation: Which federation standards (if any) does the solution support? For
example, Salesforce and Google Apps both support SAML federation; if you use those
apps, you might want SAML support. Can the solution support SSO to federated
applications alongside applications that use only username and password?
> User management: Can you speed up setting up new users by creating application
profiles for different user roles?
> Application management: Can you track application usage across all your cloud apps?
> Mobile Support: Does the SSO application work with mobile browsers on tablets? Smart
phones? Can people access the same applications easily when they switch between
devices?
> SSO service availability: What service level guarantees does the provider offer?
About CloudEntr by Gemalto
CloudEntr by Gemalto gives businesses a simple and secure way to manage cloud application
access. Using CloudEntr, businesses regain control of their trust networks and cloud
applications, while offering users convenient one-click access for all web applications in a
single interface. CloudEntr reduces complexity while helping businesses operate anywhere,
anytime, and at the right scale. Gemalto’s security and authentication expertise is trusted by
many of the world’s largest financial institutions and governments.
For whitepapers, videos or ebooks, visit www.cloudentr.com/latest-resources.

More Related Content

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

Recently uploaded (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Featured (20)

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 

A Buyer's Guide to Cloud Single Sign-On: 5 Points to Consider

  • 1. WHITEPAPER A Buyer’s Guide for Cloud Single Sign-On (SSO)
  • 2. Whitepaper 2 Table of Contents Solution Architecture 3 Security Considerations 3 Compliance Requirements 4 Total Cost of Ownership 4 Business Fit 5
  • 3. Whitepaper 3 A Buyer’s Guide for Cloud SSO If your business relies on cloud applications, you’re probably considering single sign-on (SSO) for those applications. After all, managing all of those passwords is a hassle for your business – and not having control over cloud applications can be a real risk. But what SSO solution do you choose? Does it have to be expensive and complicated? Can it fit into your business? These are some of the questions that may keep you from moving forward – that, and fear that you’ll be undertaking another major technology initiative. This paper should help in your decision process. It offers guidelines for choosing a cloud SSO solution that meets your business needs. Solution Architecture The first question to ask is the architecture question. Do you want to go old-school with on- premise software? If you have existing Identity and Access Management (IAM) software in- house, can you easily extend it to handle cloud applications? Or do you want to look to the cloud for your cloud SSO solution? > If you have an existing on-premise IAM solution, you may have options for extending it to the cloud. > A new generation of cloud-based SSO solutions, themselves delivered from the cloud, offer the rapid deployment and low maintenance costs that you love about cloud applications. Security Considerations Security is one of the biggest reasons people turn to cloud SSO, so be sure to look closely at how the SSO solution handles the big issues: > Data security in transit and at rest: How are your application credentials encrypted in transit? How are they stored in the SSO application? Who can access those credentials outside of your business? Who has access to the encryption key? > Cloud application security: Does the solution give you control over application access? For example, can you get people running without actually giving them the logins to your Salesforce or HR applications? > Phishing and identity theft protection: What kind of protection do you get from data breaches or phishing? > Two-factor authentication: Can you add a second factor to the SSO login so you don’t rely on passwords alone? If so, what factors can you use?
  • 4. Whitepaper 4 > SSO provider security: Take a close look at the vendor. What kind of industry standing do they have? Does the data center hosting the service meet high standards for security and availability? Can the provider’s employees ever access your credentials? Compliance Requirements If you’ve got people responsible for compliance, they’ll be interested in the security questions above, as well as some of their own concerns: > Audit/reporting: Can you audit all access to business applications? Is it easy to run reports on access? > Password policies: Can you set and enforce password policies for the individual applications? For the SSO portal? > Deprovisioning: When someone leaves, how quickly and completely can you remove their access to business applications? Total Cost of Ownership No decision guide is complete without a consideration of total cost. Don’t look just at the purchase (or subscription) cost. Consider the total cost of ownership. > Subscription/licensing cost: If you’re looking at on-premise software, what are the one- time licensing costs and ongoing maintenance costs? For a cloud-based solution, what is the subscription model – per application, per user, some combination of the above? Model your anticipated business and application growth against the subscription model to determine actual pricing. > Deployment cost: How much work will it take to implement the solution with your existing applications? Are you going to need to hire expensive consultants to make it work? Do you need to install any software on your own equipment? And how well will the service provide support you during the deployment? > Legacy or non-standard application costs: Are there extra costs associated with supporting that home-grown application, or that strange app that your researchers love and no one else uses? > Training costs: How hard is it to use – are you going to have to train people? If so, what’s the cost of training? > Two-factor authentication: If the solution offers two-factor authentication, what factors does it support? How much will it cost to outfit business users with the authentication factors (tokens, cards, software)?
  • 5. Whitepaper 5 > Administrative costs: How much administrator time does the solution require on a daily, weekly and monthly basis? Who handles SSO password or authentication problems? What’s involved in adding new users or removing access when people leave? Business Fit You’re probably interested in helping people be more productive. For that, you need to understand how well the SSO solution fits your current business. > Application fit: Does it work with the applications you use? Does it require a lot of work to support custom or new apps? > Directory integration: Can you link the SSO solution to your existing Active Directory (or other directory). Directory integration gives you one place to manage user identities. > Identity federation: Which federation standards (if any) does the solution support? For example, Salesforce and Google Apps both support SAML federation; if you use those apps, you might want SAML support. Can the solution support SSO to federated applications alongside applications that use only username and password? > User management: Can you speed up setting up new users by creating application profiles for different user roles? > Application management: Can you track application usage across all your cloud apps? > Mobile Support: Does the SSO application work with mobile browsers on tablets? Smart phones? Can people access the same applications easily when they switch between devices? > SSO service availability: What service level guarantees does the provider offer? About CloudEntr by Gemalto CloudEntr by Gemalto gives businesses a simple and secure way to manage cloud application access. Using CloudEntr, businesses regain control of their trust networks and cloud applications, while offering users convenient one-click access for all web applications in a single interface. CloudEntr reduces complexity while helping businesses operate anywhere, anytime, and at the right scale. Gemalto’s security and authentication expertise is trusted by many of the world’s largest financial institutions and governments. For whitepapers, videos or ebooks, visit www.cloudentr.com/latest-resources.