Reading Time: 3 minutes
Cloud service providers are facing increased demand for convenient and user-friendly access to their services. The ability to support multiple access and authentication protocols for single sign-on (SSO) has become an important competitive advantage.
These protocols include:
● Web security protocols like SAML, OpenID and OAuth.
● National digital identity systems.
● Social media credentials like Twitter, Google or Facebook.
● Two-factor or multi-factor authentication t...
When an employee resigns or is terminated, it is a challenging time for management and former colleagues. On the employee’s last days, focus tends to be on enabling the ex-employee to leave with dignity, and to make arrangements to reassign their duties to their former colleagues.
Policies and procedures to “offboard” former employees are often not as well documented as for onboarding new hires. If an employee had access to a myriad of business applications, their credentials to some of them ...