InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

From SAML to OIDC: Single Sign-On for Modern Applications

Presented by

Jeff Yeo, Regional Technical Solutions Architect, ASEAN and Greater China, Cisco

About this talk

We are excited to share that Duo Single Sign-On will soon support the Open ID Connect (OIDC) authentication protocol. OIDC can improve the end user experience and security posture simultaneously by natively supporting use cases that Secure Access Markup Language (SAML) struggled to, such as mobile and single page apps. Duo will support OIDC as well as SAML protocols to help our customers crawl, walk and run as they embark upon the OIDC journey. Duo SSO is available to all paying Duo customers regardless of their subscription. This is yet another step to democratize security by reducing reliance on passwords and making secure access available to all. Check out this webinar to learn more about what’s next!
Duo Security - Cisco

Duo Security - Cisco

22285 subscribers107 talks
Democratizing security through zero-trust secure access.
Duo is a cloud-based security platform that protects access to all applications, for any user and device, from anywhere. It’s designed to be both easy to use and deploy, while providing complete endpoint visibility and control. Duo verifies users' identities with strong multi-factor authentication. Paired with deep insights into your users’ devices, Duo gives you the policies and control you need to limit access based on endpoint or user risk. Users get a consistent login experience with Duo's single sign-on that delivers centralized access to both on-premises and cloud applications. With Duo, you can protect against compromised credentials and risky devices, as well as unwanted access to your applications and data. This combination of user and device trust builds a strong foundation for a zero-trust security model.
Related topics