Try WSO2 Cloud for Free
Sign in

All docs This doc

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

In the connected world that we live in today, modern enterprises have to offer their numerous provide customers remote access to sizable amounts of sensitive and confidential information, while maintaining access control and stringent information security at all times. Additionally, all All of this has to take place at the bat of an eyelid.
A typical connected business today relies on users who are constantly on the move and using various applications and devices. These users now have their own devices for ease of access and prefer to sign in just once. Basically, the connected business caters to people who want to use their Facebook, Google, or LinkedIn credentials to access other information using their own devices. Here’s the catch: an individual’s identity needs to be validated across these applications, and this needs to take place in a manner that ensures security, speed of access, and ease of use
 

...

WSO2 Identity Cloud provides secure identity management for enterprise web applications, services, and APIs by managing identity and entitlements of the users securely and efficiently. WSO2 Identity Cloud enables enterprise architects and developers to reduce identity provisioning time, guarantees secure online interactions, and delivers a reduced provides single sign-on environmentcapabilities
WSO2 Identity Cloud allows you to create, maintain, and terminate user accounts along with user identities across multiple cloud applications. When there are multiple applications that require authentication, users can sign in at one place and still have seamless access to all the other applications.
Additionally, WSO2 Identity Cloud brings about a new and improved approach to federation. There is a centralized Identity as a Service Provider. It is still an overall n to n relationship. There is a 1 to n relationship from a federation partner to consumer services (where multiple consumer services rely on a single centralized federated Identity Provider for security) and a 1 to n relationship from consumer service to federation partners (where a single consumer service can rely on multiple Identity providers for security). This model ensures greater efficiency.

...