{"id":86698,"date":"2020-05-08T17:05:07","date_gmt":"2020-05-08T22:05:07","guid":{"rendered":"https:\/\/www.een.com\/?p=86698"},"modified":"2020-08-11T13:49:52","modified_gmt":"2020-08-11T18:49:52","slug":"sso-single-sign-on-improve-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.een.com\/nl\/blog\/sso-single-sign-on-improve-cybersecurity\/","title":{"rendered":"Improving Cybersecurity with Single Sign-On (SSO)"},"content":{"rendered":"<p>Single Sign-On (SSO) is a secure and easy way to streamline access management across multiple applications and websites. With SSO, users enter their login credentials once on a single page and gain access to all Cloud applications.<\/p>\n<h2>Eagle Eye Networks and SSO<\/h2>\n<p>Eagle Eye Networks believes only an open API ecosystem can create truly innovative security solutions. The Eagle Eye Video API Platforms gives customers the freedom to leverage third-party partnerships to further enhance their operational efficiency.<\/p>\n<p>For improved cybersecurity and user experience, Eagle Eye Networks introduced single sign-on with SAML 2.0 to the Eagle Eye Cloud VMS. Using SSO Customers can easily add or revoke access to Eagle Eye Cloud VMS via their Active Directory or LDAP.<\/p>\n<h2>Why Do You Need SSO?<\/h2>\n<p>Many companies rely on LDAP or Active Directory as their \u201csource of truth\u201d for authenticating and providing access to on-premise resources, such as networks and web applications.<\/p>\n<p>A problem arises, however, as the number of applications increases. More applications mean more unique sets of credentials, this can quickly become difficult to manage. With an increasing number of user credentials, administrators can quickly lose track of who has access to what. This problem only becomes further complicated if someone leaves the company.<\/p>\n<p>That\u2019s why many companies are turning to SSO solutions. SSO solutions provide a single authentication integration point between multiple applications and a company\u2019s LDAP or Active Directory. By using SSO, companies can continuously pursue the cloud applications they need without building and managing multiple directory integrations.<\/p>\n<h2>How Does SSO Work?<\/h2>\n<p>When a user logs into the SSO solution, the SSO creates an authentication token which verifies that the user is who they say they are. This is done by checking the user\u2019s credentials against a separate identity management system.<\/p>\n<p>This authentication token is stored digitally, either in the browser or the SSO\u2019s server. Whenever a user goes to access an application, the application checks the SSO for the authentication token before granting the user access.<\/p>\n<h2>The Advantages of SSO<\/h2>\n<p>SSO solutions provide a number of benefits for enterprises who incorporate it into their access management system, including:<\/p>\n<ul>\n<li>Improved cybersecurity as there are fewer credentials at risk<\/li>\n<li>Simplified user experience by eliminating the need to store and secure a separate set of credentials.<\/li>\n<li>Standardization eliminates barriers associated with vendor or platform-specific architecture.<\/li>\n<li>Reduced administrative costs and increased efficiency as business owners and employees access multiple applications with a single set of credentials.<\/li>\n<\/ul>\n<p>To learn more about leveraging SSO with the Eagle Eye Cloud VMS, please reach out to us at <a href=\"mailto:sales@een.com\">sales@een.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Single Sign-On (SSO) is a secure and easy way to streamline access management across multiple applications and websites. With SSO, users enter their login credentials once on a single page &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.een.com\/nl\/blog\/sso-single-sign-on-improve-cybersecurity\/\"> <span class=\"screen-reader-text\">Improving Cybersecurity with Single Sign-On (SSO)<\/span> Lees verder &raquo;<\/a><\/p>\n","protected":false},"author":3155,"featured_media":86700,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[232],"tags":[1275,1273,1272],"class_list":["post-86698","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","tag-cloud-computing","tag-cloud-video-surveillance","tag-video-management-software"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.een.com\/nl\/wp-json\/wp\/v2\/posts\/86698","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.een.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.een.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.een.com\/nl\/wp-json\/wp\/v2\/users\/3155"}],"replies":[{"embeddable":true,"href":"https:\/\/www.een.com\/nl\/wp-json\/wp\/v2\/comments?post=86698"}],"version-history":[{"count":0,"href":"https:\/\/www.een.com\/nl\/wp-json\/wp\/v2\/posts\/86698\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.een.com\/nl\/wp-json\/wp\/v2\/media\/86700"}],"wp:attachment":[{"href":"https:\/\/www.een.com\/nl\/wp-json\/wp\/v2\/media?parent=86698"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.een.com\/nl\/wp-json\/wp\/v2\/categories?post=86698"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.een.com\/nl\/wp-json\/wp\/v2\/tags?post=86698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}