classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory


Why your cloud app should be SAML-enabled
April 2016, Cyber Security

For many companies, SSO (Single Sign-On) and MFA (Multifactor Authentication) have gone from being ‘nice extras’ to ‘must-haves’. If you haven’t already lost business because your application doesn’t support these features, chances are good that you soon will.

David Meyer, VP of product at OneLogin.
David Meyer, VP of product at OneLogin.

In many regulated industries such as healthcare and legal, identity management and SSO are mandated and other industries, such as high tech, that place a high value on efficiency and business integrity, simply won’t use a product that doesn’t support SAML (Security Assertion Markup Language).

Doug Meier, the director of security and compliance at Pandora says, “Identity management SSO is so crucial to Pandora that if a prospective cloud app vendor doesn’t have a SAML-connector for its SSO system – which happens about 30 percent of the time – the company will walk away.”

Other companies may not require SAML, but without a doubt, they sure would love to have the features SAML provides. One of the top feature requests for HipChat, with 2768 votes is SAML. Commenters are begging for SSO because the ease would increase app usage by employees, while others reveal they have given up the app after three years of unmet requests and have turned to a competitor.

Implementing SSO and MFA is time consuming

Getting it wrong can be disastrous: just like with any other crucial technology decision, choosing a solution that turns out to be difficult to maintain or doesn’t hold up over time can be a major setback in time and money.

Therefore, your focus should be on finding a solution that is hassle-free and long lasting. Managing federation with a slew of different providers or rolling your own MFA adds a significant amount of technical debt.

For early to mid-stage startups, simply rolling out SAML enables organisations using an identity management system such as OneLogin, to layer MFA before authentication happens via SAML, effectively increasing the security of your application, with no work on your part. Add a line like this to your FAQs: “We support multi-factor authentication through our cloud IAM partners,” and call it a day.

SAML is hassle-free and long lasting

SAML is easy because it doesn’t take a lot of time and money to implement. SAML is an XML-based, open-standard data format for exchanging authentication and authorisation data between parties, in particular, between an identity provider and a cloud application. It’s true that SAML used to be a huge and complex investment to enable. However, now you can enable SAML in as little as two hours. Learn how to enable SAML at www.onelogin.com/resources/saml-toolkits.

And SAML is safe because it is an industry standard that has been around since 2002 and is used by thousands of applications and all the leading IAM vendors. It isn’t going to disappear any time soon or be replaced by some new flavour-of-the-day that comes along.

Add value (that you can charge for)

By enabling SAML, you’re increasing the value of your app through all the benefits SAML provides: SSO, better usability, speed, and phishing prevention. You can enable SAML on your higher cost plans, such as an enterprise plan, and be reimbursed for the value you added.

Improve your application’s security profile

By using SAML to authenticate an identity instead of passing a username and password, it can decrease your vulnerability to several attacks:

• Completely eliminates the phishing attack vector. The user doesn’t even have a password that they could enter and they won’t ever see a login screen.

• Users often reuse passwords between sites. If another site is compromised and the passwords leaked, they won’t be able to be used on your application.

• Password resets can be used to compromise an application if a user’s email account has been hacked. With SSO there is no password to reset (and no users sending frustrated e-mails that they can’t login).

If your application is easy to use and automatically provisioned for employees, the likelihood that they will use it increases significantly. For many applications, the hassle of trying to remember the password or ask a co-worker to ‘add you to the account’ slows adoption.

Being an industry-standard not only makes SAML safe, but also improves your credibility – because when you follow the industry standard, you prove to potential customers that you know what you’re doing.

OneLogin offers free open-source SAML toolkits ( www.samltool.com) in five different web development platforms: .Net, Java, PHP, Python, and Ruby.


  Share via Twitter   Share via LinkedIn      

Further reading:

  • Accessing cyber security
    November 2016, Tyco Security Products, This Week's Editor's Pick, Access Control & Identity Management, Cyber Security, Security Services & Risk Management
    Tyco Security Products is taking a proactive role in securing its range of physical security products by developing its Cyber Protection Programme.
  • Control your own privacy
    November 2016, Technews Publishing, Cyber Security
    Whether you know it or not, or whether you care or not, everything you do online is being tracked. TrackOFF protects you digital identity from fingerprinting and other nefarious online spies.
  • The app effect on security
    November 2016, Cyber Security
    While security teams focus on patching operating systems and web browsers, vulnerabilities in those two types of software typically account for a small amount of publicly disclosed vulnerabilities.
  • Datacentrix revamps Security Operations Centre
    November 2016, News, Cyber Security, Security Services & Risk Management
    Datacentrix, a provider of high performing and secure ICT solutions, has officially launched its overhauled Security Operations Centre (SOC), unveiling a highly intelligent service that provides actionable information to help organisations respond to attacks faster and more efficiently.
  • IT security drives business growth
    November 2016, This Week's Editor's Pick, Access Control & Identity Management, Cyber Security
    South African businesses highlight a 30% percent increase in revenue from new business, while almost three-quarters agree identity-centric security is critical to the business.
  • King IV looks at your data
    November 2016, J2 Software, Cyber Security, Security Services & Risk Management
    The launch of the King IV Report on Corporate Governance by the Institute of Directors in Southern Africa on 1 November provides a wake-up call for South African organisations.
  • Multi-modal security best for registered financial service providers
    October 2016, Technews Publishing, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management, Cyber Security, Integrated Solutions, Financial (Industry)
    The financial sector faces a number of security challenges that range from outright banking hall robberies, through theft of money at ATMs, internal and external fraud, as well as phishing and similar cyber threats.
  • After the data breach
    October 2016, This Week's Editor's Pick, Cyber Security, Security Services & Risk Management, Financial (Industry)
    Lifars and Fortress Strategic Communications outline steps companies need to take after they contain the data breach and initiate the process of normalising business operations.
  • Biometric skimmers are here
    October 2016, News, Cyber Security
    According to a Kaspersky Lab investigation into underground cybercrime, there are already at least twelve sellers offering skimmers capable of stealing victims’ fingerprints.
  • Great cyber security needs great people
    October 2016, This Week's Editor's Pick, Cyber Security, IT infrastructure, Training, Conferences & Events
    Solutions are not reaching their full potential thanks to a dire shortage of cyber security professionals to harness them.
  • Tyco strengthens reader-to-panel communications
    October 2016, Tyco Security Products, Access Control & Identity Management, Cyber Security
    C•CURE 9000 v2.50 event management platform now supports Open Supervised Device Protocol (OSDP), developed by the Security Industry Association (SIA) to allow for enhanced interoperability among security devices.
  • New Milestone VMS
    October 2016, Milestone Systems, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions, Products
    Milestone XProtect 2016 R3 Advanced VMS announced with focus on total cost of ownership, performance and cyber security – making video solutions more cost-effective through innovative new features.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.