
This checklist is designed to offer guidance to decision makers in enterprises, small and mid-tier organizations, government agencies or other organizations to assess single sign-on (SSO) systems, as well for SSO developers to ensure that they have provided is equipped to detect the possibilities of exchanging identification and authentication credentials.
| Key Metrics | Does the SSO Support |
| Application Integration | On-premises
|
| Community Support |
|
| End users or customers |
|
| Password Vaulting vs True SSO |
|
| Open Standards |
|
| Mobile Users |
|
| Meet Security regulatory compliance |
|
| Disaster Recovery Availability |
|
| High usability features |
|
| Enterprise access |
|
| Authentication |
|
| Authorization Management |
|
| Integration features |
|
| Federation |
|
| Password rules |
|
| Developer Support -custom apps and third party systems |
|
| Compliance based reporting |
|
| User Behaviour Analytics (UBA) |
|
| Data processing model |
|
Sennovate delivers custom identity and access management solutions to businesses around the world. With global partners and a library of 1000+ integrations, we implement world-class cybersecurity solutions that save your company time and money. We offer a seamless experience with integration across all cloud applications, and a single price for product, implementation, and support. Have questions? The consultation is always free. Email [email protected] or call us at: +1 (925) 918-6618.