Single sign-on (SSO) is a user authentication service that enables an organization's members (users) to use a single set of login credentials to access multiple applications and services. This service, also known as an Identity Provider (IDP), authenticates the user for all applications to which the user has access, and eliminates further prompts when the user switches between applications during the same session. On the backend, SSO helps log user activities and monitor user accounts.
The benefits of using single sign-on include:
If your organization is using an SSO service, you can connect Fabric to it. Fabric supports SAML for SSO.
Security Assertion Markup Language (SAML) is a standard protocol used for SSO. It provides a mechanism for exchanging authentication and authorization data between an identity provider (IDP) and a service provider (SP).
The SP requests and obtains an authentication assertion from the IDP. Based on this assertion, the SP can make an access control decision. That is, it can decide whether to give access to some or all of the SP resources. The interactions are XML-based and utilize certification, encryption, and other security measures to safeguard these interactions and prevent fraud.
Single sign-on (SSO) is a user authentication service that enables an organization's members (users) to use a single set of login credentials to access multiple applications and services. This service, also known as an Identity Provider (IDP), authenticates the user for all applications to which the user has access, and eliminates further prompts when the user switches between applications during the same session. On the backend, SSO helps log user activities and monitor user accounts.
The benefits of using single sign-on include:
If your organization is using an SSO service, you can connect Fabric to it. Fabric supports SAML for SSO.
Security Assertion Markup Language (SAML) is a standard protocol used for SSO. It provides a mechanism for exchanging authentication and authorization data between an identity provider (IDP) and a service provider (SP).
The SP requests and obtains an authentication assertion from the IDP. Based on this assertion, the SP can make an access control decision. That is, it can decide whether to give access to some or all of the SP resources. The interactions are XML-based and utilize certification, encryption, and other security measures to safeguard these interactions and prevent fraud.