Single Sign On and Authentication
Next in Series:
About this presentation:
Understand how to connect Syncplicity to your company directory or IDP to provision and authenticate your users. Syncplicity works with Active Directory (AD) SAML, as well as IDP's such as Okta, One Login, and Ping Federate.
Authentication can be completely delegated to your AD/LDAP by leveraging federated authentication. For an SSO enabled account, Syncplicity clients (Desktop, Mobile, Web) only require user’s email address (userid) for login. Because authentication is delegated to secure, authorized servers outside of Syncplicity’s control, Syncplicity servers are never privy to corporate passwords—authentication credentials remain squarely in the control of the corporate system. Active Directory and LDAP single sign-on (SSO) with Syncplicity allows companies of any size to leverage their existing corporate directories and authentication systems to authorize employee access to Syncplicity.
Users can be provisioned directly in the Syncplicity account. Optionally, you can use Active Directory (AD) Sync, so IT administrators only have to manage their users using their centralized AD/LDAP system. AD/LDAP is still the main source for user management and identities for majority of the enterprises. IT administrators need a way to be able to provision cloud applications based on permissions in the AD or LDAP. With the OneLogin, Okta or PingFederate integration, changes to Active Directory accounts are automatically applied to Syncplicity accounts in real time without duplication of effort.