The Elastic SSO® Enterprise Software, is an enterprise-grade, high-availability, open standards-compliant, federated identity (IAM) and single sign-on (SSO) access management solution. It is specifically designed for enterprise IT customers and managed service providers (MSPs) who want to leverage and extend existing enterprise authentication infrastructure for enabling secure access to Apps.
The Elastic SSO solution integrates with customer’s existing on-premise enterprise Active Directory, LDAP, SQL, CAS, ADFS, NTLM, SPNEGO, Kerberos or Windows authentication and provides secure federated single sign-on access for Users to Apps. Elastic SSO software can be remotely deployed on RHEL/CentOS virtual machine(s) in Customer’s or MSP’s datacenter.
- Shibboleth V3+, SAML 2.0, and CAS compliant SSO authentication.
- Leverages existing on-premises authentication, such as, Microsoft Active Directory, Azure AD, ADFS, LDAP, SQL, CAS, Kerberos, NTLM, SPNEGO and Windows Authentication.
- Pluggable 3rd party multi-factor authentication systems, such as, Duo, Google MFA, Amazon MFA and others.
- Interoperates with Shibboleth SAML2 identity federations such as Internet2, InCommon, UK, Edugate, AAF, KID, SWAMI and others.
- High-Availability, clustered and load balanced.
- Session Persistence. Maintain end-user SSO sessions during reboots.
- Customizable Login UI. Supports custom co-branded login UI.
- Interoperates with thousands of Shibboleth, SAML, CAS or ADFS enabled Apps.
- Container based deployment, remote management and monitoring.
- Premium support and maintenance subscriptions.
- Improved Security. No more password leaks or multiple passwords. Users simply use their existing Enterprise passwords stored in local Active Directory (or LDAP/SQL) for accessing all online resources.
- Improved Privacy. Users personal identifying data no longer need to be shared with SaaS vendors just for enabling secure access to Apps.
- Compliance and Governance. IT Managers are now able to exert fine-grained control over who has access to what data. In addition, IT staff gets better visibility via access logs and audit data into access controls and breaches.
- Better U/X. Users no longer need to create and manage multiple passwords for accessing online resources. One single passwords gives them access to all resources.