Click any tag below to further narrow down your results
Links
This article explains single sign-on (SSO) and its variations, particularly focusing on Enterprise SSO, which uses employer-provided accounts for access across multiple applications. It covers the roles of SAML for implementing Enterprise SSO and SCIM for managing user data synchronization and deactivation.
BYO Auth allows you to add advanced authentication features like session management, SSO, and passwordless login to your existing system without migration. It's designed to integrate seamlessly with your current infrastructure, whether it's built in-house or third-party. The self-hosted option gives you complete control over user data.
Fortinet confirmed that a December patch failed to fully secure its FortiCloud single sign-on system, allowing attackers to access devices with the supposed fix. New attack methods have been identified, prompting Fortinet to investigate further and advise customers to monitor for unusual login activity.
This article explains how to enable single sign-on (SSO) for your application using Vercel accounts. It includes a link to a setup guide that walks you through the configuration process. This makes it easier for users to sign in with their existing Vercel credentials.
The author shares a misstep during an AWS migration from IAM Users to SSO, resulting in a permissions error related to a KMS key. After discovering the issue, they detail the recovery process and a new checklist step to prevent similar problems in the future.
This guide from Auth0 explains the fundamentals of Single Sign-On, breaking down key protocols like SAML and OIDC. It offers practical advice on starting with SSO and integrating it with Auth0, along with insights on whether to build, buy, or blend solutions.
Fortinet disclosed a new zero-day vulnerability, CVE-2026-24858, which allows attackers to exploit the FortiCloud single sign-on feature for unauthorized logins. This critical flaw has a CVSS score of 9.8 and affects multiple Fortinet products, prompting the company to temporarily disable SSO authentication to mitigate ongoing attacks.
Arctic Wolf detected malicious SSO logins on FortiGate appliances linked to critical vulnerabilities CVE-2025-59718 and CVE-2025-59719. These vulnerabilities allow unauthenticated access via crafted SAML messages if the FortiCloud SSO feature is enabled. Administrators are urged to reset credentials, restrict access, and upgrade to the latest software versions.
This article explains how to integrate Enterprise SSO and SCIM into your product to meet enterprise customer needs. It covers the differences between SSO and SCIM, architectural decisions for account merging, and steps for adding these features using PropelAuth BYO.
The article discusses the process of setting up Single Sign-On (SSO) using Descope's platform, highlighting its ease of integration and benefits for user authentication. It provides a step-by-step guide for developers to implement SSO effectively, enhancing security and user experience across applications.
WorkOS offers a streamlined solution for integrating enterprise features into applications, enabling developers to implement functionalities like single sign-on and user management quickly. With support for various authentication methods and a user-friendly admin portal, it simplifies the process of catering to enterprise customers. This allows businesses to expand their market reach and improve client satisfaction without extensive development time.
Building features like SSO and SCIM in-house can significantly delay enterprise adoption for SaaS startups due to the complexities and time demands involved. The article outlines the phases of developing these features and emphasizes the benefits of using WorkOS, such as reduced development costs and faster onboarding for enterprise customers.
WorkOS provides a comprehensive solution for developers to quickly integrate enterprise features, such as single sign-on (SSO), user management, and authentication options, into their applications. With a developer-first design and support for numerous identity providers, it simplifies the process of becoming enterprise-ready, allowing businesses to expand their market reach effectively.