This checklist is designed to offer guidance to decision makers in enterprises, small and mid-tier organizations, government agencies or other organizations to assess single sign-on (SSO) systems, as well for SSO developers to ensure that they have provided is equipped to detect the possibilities of exchanging identification and authentication credentials.
Key Metrics | Does the SSO Support |
Application Integration | On-premises
|
Community Support |
|
End users or customers |
|
Password Vaulting vs True SSO |
|
Open Standards |
|
Mobile Users |
|
Meet Security regulatory compliance |
|
Disaster Recovery Availability |
|
High usability features |
|
Enterprise access |
|
Authentication |
|
Authorization Management |
|
Integration features |
|
Federation |
|
Password rules |
|
Developer Support -custom apps and third party systems |
|
Compliance based reporting |
|
User Behaviour Analytics (UBA) |
|
Data processing model |
|
Sennovate delivers custom identity and access management solutions to businesses around the world. With global partners and a library of 1000+ integrations, we implement world-class cybersecurity solutions that save your company time and money. We offer a seamless experience with integration across all cloud applications, and a single price for product, implementation, and support. Have questions? The consultation is always free. Email [email protected] or call us at: +1 (925) 918-6618.