The Elastic SSO® Enterprise Software, is an enterprise-grade, high-availability, open standards-compliant, federated identity (IAM) and single sign-on (SSO) access management software solution. It is specifically designed for enterprise customers who want to leverage and extend their existing on-premises identity management and authentication infrastructure.
The Elastic SSO solution integrates with customer’s existing on-premises enterprise Active Directory, LDAP, SQL, CAS, ADFS, NTLM, SPNEGO, Kerberos or Windows authentication infrastructure and provides secure federated single sign-on access for Users to SaaS and on-premises enterprise Apps. Elastic SSO software can be remotely deployed on RHEL/CentOS virtual machine(s) in Customer’s datacenter.
- Shibboleth V3+, SAML 2.0, and CAS compliant SSO authentication.
- Leverages existing on-premises authentication infrastructure, such as, Microsoft Active Directory, Azure AD, ADFS, LDAP, SQL, CAS, Kerberos, NTLM, SPNEGO and Windows Authentication.
- Multi-factor authentication.
- Easy to integrate with Shibboleth SAML2 identity federations such as InCommon, UK federation, Edugate, AAF, KID, SWAMI and others.
- Clustered and load balanced. Ideal for high usage, high availability SSO environments.
- Session Persistence. Maintain end-user SSO sessions during reboots.
- Customizable Login UI. Supports custom co-branded login UI.
- Powerful, versatile self-service Identity Management Web-UI (optional).
- Compatible with thousands of Shibboleth, SAML, CAS or ADFS enabled Apps.
- Container based deployment, remote management and monitoring.
- Premium support and maintenance subscriptions.
- Improved Security. No more password leaks or multiple passwords. Users simply use their existing Enterprise passwords stored in local Active Directory (or LDAP/SQL) for accessing all online resources.
- Improved Privacy. Users personal identifying data no longer need to be shared with SaaS vendors just for enabling secure access to Apps.
- Compliance and Governance. IT Managers are now able to exert fine-grained control over who has access to what data. In addition, IT staff gets better visibility via access logs and audit data into access controls and breaches.
- Better U/X. Users no longer need to create and manage multiple passwords for accessing online resources. One single passwords gives them access to all resources.