In our final post on migrating to a CA SSO solution, we will present six things you need to keep in mind if you want to accelerate the project. There is no standard timeframe for implementation of CA SSO; the speed of implementation is dependent upon a wide range of factors. These factors...
1 Comment - no search term matches found in comments.
Migrating applications is actually an onboarding exercise. You’ll need to define the resources that are protected for an application, assign agents or CA Access Gateway proxy rules, determine a login method for the applications and access rules, and map those rules to user roles and/or groups....
So far, my posts have covered various aspects of non-policy-based SSO. Today, I’ll share a real-world example of non-policy-based SSO in action at a CA Technologies customer, one I consider a visionary pioneer in digital transformation. One proof point for my opinion is that the company embarked...
Whether applications reside in the enterprise or the cloud, managing user identities and access to key resources is a critical function for IT organizations. It’s especially critical for CIOs who are under increasing pressure to cut operating costs, demonstrate continuous compliance and support...
As organizations enter emerging markets by acquiring companies that are successful in those markets, the burden falls to IT departments to introduce new services, maintain security and reduce costs by integrating and streamlining operations, all while onboarding acquired employees. Often, that...
In a leading market survey, 66% of IT security officers stated that their identity and access management processes were too manual and insufficiently automated. This indicates that many organizations get less than full value from their identity management (IDM) solution. As a CA Services...
2 Comments - no search term matches found in comments.
Making the Complex Simple: Non-Policy-Based Single Sign-On is the Wave of the Future As we all know, single sign-on (SSO) permits a user to access multiple applications and Web services with a single set of login credentials, usually a user name and password. Organizations value SSO...