The Single Sign-On service provides support for native authentication, federated single sign-on, and authorization. Operators can configure native authentication and federated single sign-on, for example SAML, to verify the identities of application users. After authentication, the Single Sign-On service uses OAuth 2.0 to secure resources or APIs.
Integrate with enterprise identity federation systems via SAML/OpenID
Single Sign-On for PCF uses industry-standard protocols (like SAML, OAuth, and OpenID) for identity management. Easily integrate with popular identity providers like Active Directory or Google Cloud. Intuitive dashboards simplify administration of service plans and IdM systems.
Security abstractions maximize developer velocity
Empower your developers with a self-service interface. Bootstrap and automate identity configurations and resource permissions through application manifests. Use multi-tenant service plans to segment identities & policies.
Automate security enforcement and runtime configuration
Single Sign-On handles identity from start to finish. The service translates complex interactions with your legacy systems into OAuth and OpenID compliant tokens for your applications and APIs to consume. From there, Single Sign-On configures frameworks such as Spring Boot and Steeltoe for .NET to automatically handle these tokens for you.
The Single Sign-On service allows users to log in through a single sign-on service and access other applications that are hosted or protected by the service. This improves security and productivity since users do not have to log in to individual applications. The service converts legacy identity protocols into modern cloud-native, federated protocols for your applications and APIs to consume. Developers using Spring Boot (for Java) or Steeltoe (for .NET) can accelerate development with identity that just works. Developers are responsible for selecting the authentication method for application users. They can select native authentication provided by the UAA or external identity providers.
Fully automated management of the service on Pivotal Cloud Foundry. Monitoring, failure recovery, and software updates with zero-to-minimal downtime.
Operators can customize plan definitions to support orgs, spaces, roles, and users.
The service is documented with instructions for setup and operation.
Leverages and extends the features and capabilities of Cloud Foundry’s User Account and Authentication (UAA) service.
“The Single Sign-On Service on PCF offers a turnkey solution that enables strong application security while easing user experience. This technology release is based on standards like OAuth, OpenID Connect, and SAML 2.0. Our objective is to offer developers a simplified experience while making it easy for operators to deploy, configure and maintain the service.”
Sree Tummidi, Product Manager for Identity Services on PCF and CF OSS, Pivotal
Developers are responsible for selecting the authentication method for application users. They can select native authentication provided by the UAA or external identity providers.
After authentication, the Single Sign-On service uses OAuth 2.0 for authorization. OAuth 2.0 is an authorization framework that delegates access to applications to access resources on behalf of a resource owner.
Developers define resources required by an application bound to a Single Sign-On (SSO) service instance and administrators grant resource permissions.
Detailed installation guides are available for these identity management services:
- Active Directory Federation Services (AD FS) Integration Guide
- Azure Active Directory Integration Guide
- CA Single Sign-On Integration Guide
- Google Cloud Platform OpenID Connect Integration Guide
- Okta Integration Guide
- PingFederate Integration Guide
- PingOne Cloud Integration Guide
Vielen Dank für Ihr Interesse!
Wir melden uns in Kürze bei Ihnen.