- Upgrades & Unicode Conversions
- Disaster Recovery
- Cluster Installation
- Single Sign-on Configuration
- Network Security
- Data Center & Backup Solutions
News & Events
Single Sign-on Configuration
OBS has partnered with “CyberSafe Limited • The Kerberos Solution Provider” in doing Single Sign-on configuration; we not only work closely with our partner but also co-develop much of the training courseware in cooperation with them, utilizing their product plans, software and source materials.
Why Single Sign On?
Single Sign-On is the subsequent automated authentication for additional systems after the user has logged on once. In this case, the authenticating system passes the user information to the subsequently called system. This is done in the background; that is, the user does not need to authenticate himself or herself again after his or her first logon.
Improving the security of your applications, and your user’s access to them. You can use one common, secure, centrally managed and scalable authentication solution across your multiple operating systems, applications and environments and no longer have to suffer the consequences of users sharing their passwords, passwords being stored inside code or scripts, or being transmitted across your network.
You can use multiple forms of authentication, such as username/password, token card and smart cards without having to change the way your applications recognize a user's identity if the form of authentication differs.
Have a common strategic solution for application security in a distributed environment, where your applications are hosted on multiple operating systems, use products from multiple vendors and comprise a client/server or multi-tier architecture.
Allow you to get one step closer to achieving Single Sign On, but securely ... Your users will have a reduced number of passwords to remember and therefore less chance of them being forgotten or written down for others to see!
Take full advantage of your Microsoft Active Directory deployment on your network. You can take advantage of an existing authentication of users to the Microsoft domain to secure your business applications, regardless of the operating system they are deployed on, or the application vendor, or architecture involved.