Best Enterprise Single Sign On Software - Page 3

Compare the Top Enterprise Single Sign On Software as of March 2026 - Page 3

  • 1
    Deepnet DualShield

    Deepnet DualShield

    Deepnet Security

    If you are looking for an enterprise grade 2-factor authentication (2FA) or multi-factor authentication (MFA) product that can secure all commonly used business applications and also provides a wide range of authentication methods, then you are in the right place. Deepnet DualShield is a multi-factor authentication system that unifies a variety of authentication methods, protocols, solutions and user experience in a single platform. In addition to the MFA functions, DualShield also provides self-service Password Reset, Single Sign-On (SSO), Identity & Access Management (IAM) and Adaptive Authentication. It is one of the most powerful and flexible multi-factor authentication system in the world. Deepnet DualShield can be installed on premises or hosted in a private cloud, which means that you will have the total control of your own user authentication system, and that you will be able to keep your users’ identities and credentials in a safe place.
  • 2
    Unikname

    Unikname

    Unikname

    Prevent phishing hack attempts of your web accounts in integrating the next-gen strong authentication that secures all your web access. Protect your admin account of all your websites that you manage. Offer your clients a password-less experience of registration. Add the next-gen social authentication that respects the privacy life. Easily manage the web access rights of your employees and partners. Install the Unikname solution for all web environments you need in minutes! Easily manage your trust certificates and web access from the dashboard dedicated. Manage the access rights of admins and website users. Enable Unikname as the default authentication system. Disable standard authentication. Fine-tune the style options of the Unikname login button. Unikname relies on the latest OAuth and OpenID Connect authentication protocol standards and allows to generate a trust certificate attached to your web domain name.
    Starting Price: €150 per year
  • 3
    NextGen SSO
    NextGen SSO solution that protects both internal and cloud applications with the lowest possible spend, offers the best user experience, and provides unlimited possibilities to integrate with other SSO solutions. NextGen Cloud SSO SaaS solution, not a multi-tenant or a shared application. SSO would be deployed in minutes. Tiered pay as you go model with low flat fees, free multi factor authentication, and exceptional 24/7 support. Highly secured authentication with tons of integrations with other SSO systems. Seamless SSO between both on-prem and cloud applications. Out of the box support for mobile applications, built on the standards with LDAP version 3.0 and version 2. High availability and disaster recovery are out of the box. SSO software development company helping organizations implement web security, protect mission critical applications, and prevent cyber criminals from stealing confidential data, while bringing the best user experience to the employees and associates.
  • 4
    C2 Identity

    C2 Identity

    Synology C2

    Easily grant or revoke user access to company resources with group management. Access the admin console from a browser to manage individual or groups of user accounts. Let users manage their own credentials and personal information through a self-service portal. Centrally manage users, groups, workstations, and single sign-on (SSO) for Software as a Service (SaaS) applications across your entire organization. Easily migrate users from an LDAP server, Windows AD server, Microsoft 365, Google Workspace, or by importing a CSV file. Free up IT teams' workloads by letting users reset their password, secondary email address, phone number, address, and more. Create on-premises LDAP servers for fast local authentication. Streamline authentication for SaaS applications with SSO and user account provisioning. C2 Identity's low-latency hybrid architecture lets you authenticate locally through an LDAP server for fast offline authentication.
    Starting Price: $19.99 per month
  • 5
    Citrix Secure Private Access

    Citrix Secure Private Access

    Cloud Software Group

    Citrix Secure Private Access (formerly Citrix Secure Workspace Access) provides the zero trust network access (ZTNA) your business needs to stay competitive, with adaptive authentication and SSO to IT sanctioned applications. So you can scale your business and still meet today’s modern security standards—without compromising employee productivity. With adaptive access policies based on user identity, location, and device posture, you can continually monitor sessions and protect against threats of unauthorized login from BYO devices—all while delivering an exceptional user experience. And with integrated remote browser isolation technology, users can securely access apps using any BYO device—no endpoint agent needed.
    Starting Price: $5 per user per month
  • 6
    WWPass

    WWPass

    WWPass

    No need to remember, manage, reset, protect or exchange. Consolidation of all logins in one protected authentication token. Easy self-management of the authentication token. Log in with a universal, international digital identity, trusted if required and anonymous if allowed. All data is encrypted by the user with WWPass Key. No need for OTP, SMS, or other extra costly adaptive authentication and login support. User identity is protected by WWPass Key. WWPass MFA is a strong customer authentication compliant with GDPR and NIST. Each user gets a unique key, which helps to log in to an unlimited number of accounts and services without usernames and passwords. Log in to a growing number of online services with your WWPass Key as a universal key to the digital world. Enable next-generation strong multi-factor authentication without usernames and passwords. Simplify and streamline secure access to any business application without a username and password.
    Starting Price: Free
  • 7
    BoxyHQ

    BoxyHQ

    BoxyHQ

    Security Building Blocks for Developers. BoxyHQ offers a suite of open-source APIs for security and privacy, helping engineering teams build and ship compliant applications faster, reducing Time to Market without sacrificing their security posture. 1. Enterprise Single Sign On (SAML/OIDC SSO) 2. Directory Sync 3. Audit Logs 4. Data Privacy Vault (PII, PCI, PHI compliant)
    Starting Price: $0
  • 8
    WALLIX Trustelem

    WALLIX Trustelem

    WALLIX Group

    WALLIX Trustelem is designed to make administration simple and intuitive. The web-based administration console enables IT staff to easily set up directory synchronization, manage life cycles of external user accounts and applications, create and adapt access rules, monitor activity, and audit access security. Keep control over your identities and data! The WALLIX Trustelem platform is hosted and operated by a trusted European cloud provider. Your data sovereignty and security are essential to ensure quality of service and to protect your company’s assets. Trustelem is designed for simplicity of user experience and administration, in both build and run phases. Security is at the heart of Trustelem's infrastructure, software and operations.
  • 9
    Ory

    Ory

    Ory

    The missing web-scale API for identity and access control. 10x your security, user experience, and PII compliance today. Build secure apps on top of the Ory Network and reach new customers in any geopolitical region of the world with the best login experience ever. Login is more than a username and password. Building it from the ground up is time-consuming and dangerous. Ory's API-first microservice architecture makes it straightforward to integrate projects at any stage. Pay for usage, not features. Get advanced multi-factor to auth on every Ory subscription plan. Plus advanced permissions, SSO, OAuth2, OIDC, multi-tenancy, and so much more. Ory is made for high-performance, high-scale applications in any cloud. Built with developers in mind, Ory lets you quickly build your on-brand user experience and integrate it into your software stack. Ory's focus on open standards and automated data import capabilities makes migrating from legacy systems straightforward.
    Starting Price: $29 per month
  • 10
    Infisign

    Infisign

    Infisign

    Infisign is a cutting-edge Identity and Access Management (IAM) platform that revolutionizes digital security by leveraging decentralized identity, passwordless authentication, federation, and privileged access management capabilities. The solution empowers organizations to streamline user authentication, manage access efficiently, and ensure compliance across diverse environments. With its unique approach, Infisign addresses the challenges of traditional IAM systems and offers a comprehensive solution for modern identity management.
    Starting Price: $4/user/month
  • 11
    NdSecure

    NdSecure

    Ndende Technologies

    NdSecure is a Single Sign-On (SSO) and Identity and Access Management (IAM) solution. Ndsecure offers a user-friendly, flexible, and customizable identity and access management solution capable of operating within a diverse industry-centric architecture. The role played by NdSecure is to provide a robust and secure logical access control environment, incorporating strong authentication methods. The objective is to prevent unauthorized access to the corporate management system, thereby reducing frauds arising from insider threats. NdSecure’s API management platform provides more advanced ways for the workforce to control access to various applications. By leveraging existing request content and identity stores, NdSecure can provide: • Policy-based authentication • Coarse and fine-grained authorization • Single sign-on (using SAML, OpenId Connect, social log-in or OAuth-based federation) • Support for Common Criteria • Uses FIDO 2.0 and W3C WebAuthn
    Starting Price: $8/month/user
  • 12
    SSOJet

    SSOJet

    SSOJet

    SSOJet empowers B2B SaaS companies to become enterprise-ready in minutes with seamless SSO integration. Our all-in-one solution delivers enterprise-grade security and modern team management without the complexity, start free with unlimited users.
    Starting Price: $49/month
  • 13
    Cymmetri

    Cymmetri

    Cymmetri

    From employees and partners to customers and privileged users, Cymmetri seamlessly manages and protects your entire identity ecosystem. Streamlined control over user access, ensuring secure and efficient operations in the digital landscape. Empowers seamless identity protection, safeguarding individuals and organizations with security everywhere, anytime. Streamline onboarding for all new employees. Experience the power of Cymmetri firsthand or discuss your specific IAM needs with our experts. Measurable outcomes, demonstrating the tangible and positive effects of our solutions on security, efficiency, and overall performance. Implementing robust cybersecurity enhances data protection, minimizing the risk of breaches and unauthorized access. Boost productivity with our solutions, empowering employees to thrive in a secure and efficient work environment. Enhance efficiency, streamline operations, and achieve cost savings through our innovative solutions and optimized processes.
    Starting Price: $2 per month
  • 14
    Tesseral

    Tesseral

    Tesseral

    Tesseral is the open source platform for managing identity and access in business software. It provides enterprise-grade capabilities, including SAML single sign-on, SCIM provisioning, role-based access control, managed API keys, and audit logs, implemented in just a few lines of code. Tesseral unifies access management for employees, customers, services, and AI agents, giving organizations the flexibility to adapt to any deployment model and the authority to enforce security policies with precision. You can learn more by reading our docs or by checking out our GitHub.
    Starting Price: $0
  • 15
    Teleport

    Teleport

    Teleport

    The Teleport Infrastructure Identity Platform modernizes identity, access, and policy for infrastructure, for both human and non-human identities, improving engineering velocity and resiliency of critical infrastructure against human factors and/or compromise. Teleport is purpose-built for infrastructure use cases and implements trusted computing at scale, with unified cryptographic identities for humans, machines and workloads, endpoints, infrastructure assets, and AI agents. Our identity-everywhere approach vertically integrates access management, zero trust networking, identity governance, and identity security into a single platform, eliminating overhead and operational silos.
  • 16
    Mitratech Compliance Manager (CMO)
    Intuitive obligations, audit, and incident management for compliance and risk management teams focused on improving operations and results. Mitratech Compliance Manager (CMO) gives your compliance team a centralized, holistic overview of your organization’s compliance obligations and business risks. Today, understanding compliance obligations and the potential impact of regulations is essential to mitigating business risk. The operational concerns of corporations, along with audit requirements and regulatory changes, are forcing compliance teams to manage complex, overlapping obligations. Staying passive – or worse, reactive – isn’t an option: the risks and costs, in opportunities unrealized and negative impacts on profitability, can be too damaging. Mitratech Compliance Manager (CMO) gives your compliance team a centralized, holistic overview of your organization’s compliance obligations and business risks.
  • 17
    EmpowerID

    EmpowerID

    EmpowerID

    EmpowerID is the award winning all-in-one identity management and cloud security suite developed by The Dot Net Factory, LLC dba "EmpowerID". Responsible for managing millions of internal and external cloud and on-premise identities for organizations around the globe, EmpowerID delivers the broadest range of ready to use IAM functionality. In-depth out of the box solutions include: single sign-on, user provisioning, identity governance, group management, role mining, delegated identity administration, password management, privileged access management, access management for SharePoint, and an identity platform for application developers. All solutions leverage a single sophisticated role and attribute-based authorization engine that handles complex organizations and even multi-tenant SaaS providers. We provide a highly scalable, fully customizable IAM infrastructure that delivers results in a more time and cost-efficient manner for your enterprise.
    Starting Price: $2 per user per month
  • 18
    Digital Resolve

    Digital Resolve

    Digital Resolve

    Online Security and Fraud Protection through Real-time Identity Intelligence, Authentication, and Access Control. Proactively secure online accounts, information, transactions and interactions from login to logout. The Digital Resolve platform is a cost-effective and easy-to-deploy solution that effectively mitigates risk on day one of deployment. The platform was designed by a team of seasoned experts to provide a comprehensive view of all transactions and interactions, unlike other solutions that merely detect events in isolation. Furthermore, real-time intervention options and a frictionless user experience mean that you can maintain confidence and trust among your user base- all while providing real-time protection against potential risks.
  • 19
    NCP

    NCP

    NCP engineering

    For individual workstations, freelancers or smaller installations, NCP Entry Clients offer a wide range of technical features and offer much more than a standard VPN. Our Solution Finder will help you find the right NCP product for your organization. No matter what hardware you use, whether you are looking for a solution for use in your own company or as a partner for your customers, for a few employees or large installations, we will guide you to the right product in just a few steps. With 30 years of experience in remote access environments, NCP is an excellent choice for a complete VPN solution that meets the needs of users, IT administrators and management. NCP’s remote access solutions are fully-automated, highly secure and cost efficient covering important benefits.
  • 20
    Able+

    Able+

    New Era Education

    Able+ is the most comprehensive Identity and Access Management Solution available on the market. Offering the customisation and flexibility to ensure IAM strategy aligns to business needs. Delivered as a managed service, it can be operated from the public cloud, private datacentre, or a hybrid infrastructure. It streamlines identity governance and improves user productivity and satisfaction by enabling secure single sign-on to applications. Able+ is a highly extensible platform that adapts to your organisation to meet your requirements. It saves you money and time, allowing you to innovate and grow. The choice and mix of infrastructure – public cloud, private, or a hybrid – is a key part of an organisation’s digital strategy.​ Able+ operates across any infrastructure, aligning with your evolving infrastructure strategy, and not dictating it.
  • 21
    CoreOne Suite
    CoreOne Suite is an identity and access management software for medium and large enterprises. CoreOne Suite can be used in enterprise IAM and customer IAM environments. CoreOne Suite is a Swiss Identity and Access Management software for Enterprise IAM and Customer IAM solutions. Unique IT operations management functionalities extend the reach of identity and access management for greater efficiency, security and convenience. With CoreOne Suite, organizations can achieve sustainable compliance and reduce risk. The compliance requirements are becoming more and more extensive and demanding. The CoreOne Suite offers standardized procedures so that they comply with data protection regulations such as the GDPR or the requirements of the Payment Card Industries (PCI).
  • 22
    Mi-Token

    Mi-Token

    Mi-Token

    Multi-Factor Authentication or MFA is a process of determining whether a user is authorized to access a service, website, or an application. A simple username and password are now no longer considered to be effective by security experts. MFA utilizes secure credentials to greatly reduce the likelihood of a malicious attack or identity fraud. Mi-Token, with a one-time password (OTP) greatly improves the security associated with your login credentials, as it is valid for only one login session or transaction. By default, you can add a PIN to the OTP, making your solution fully compliant with many industry standards for MFA, including those required by the Payment Card Industry Standards Council (PCI DSS 3.2)
  • 23
    Fractal ID

    Fractal ID

    Fractal Blockchain

    No more trade-offs between compliance and conversion. Fractal ID is built for regulated industries with global user bases - a KYC/AML platform delivering fast and accurate global verifications at a conversion rate 40% higher than industry standard. Comprised of experts in finance, design, law and technology, the Fractal team has a collective 45 year track-record of shipping successful products. Based out of Berlin, Porto and Singapore and comprising of 10+ nationalities, are uniquely suited to build processes and products that are easy to understand no matter where a user comes from. We consider compliance with the GDPR and protection of personal data as top priorities. We encrypt all sensitive data and have implemented state of the art security processes to protect your information. We also require anyone using Fractal ID to comply with the GDPR. You can find the relevant information about our data processors and other information in our Privacy Policy.
  • 24
    Systancia Access
    Transparent authentication, in all forms, to all your applications, on premise or cloud. Access control solution to make the access of applications simple and secure. Systancia Access, formerly Avencis SSOX, a solution labeled France Cybersecurity, is an access control and single sign-on (SSO) solution that guarantees connection security while improving the user experience. Systancia Identity is particularly easy to use once the basic base has been set up and is therefore quickly adopted by users. In addition, the software is scalable without additional costs. Due to the growing amount of data within companies and organizations, and the fact that these data are sometimes sensitive, it is essential to protect them against any potentially devastating risk of leakage, as we are reminded daily by the press. An audit revealing risks to IS security or proven data leakage is like electroshock for IS security managers.
  • 25
    Symantec SiteMinder
    Regardless of how a user accesses an application, the first step is the access management process is authentication, which enables the user to properly identify themselves. Therefore, the first critical capability of a modern access management technology is to be able to support any and all methods of authentication, and more importantly, be capable manage when each one is used to challenge a user. Once authenticated, the next critical capability is to manage and protect the user’s session. This capability unifies the user experience across multiple applications while simultaneously delivering single sign-on, but also ensuring that the user’s session is protected against hijacking. Additionally, as the user requests access to applications, the access management technology must be capable of performing authorization checks to determine whether the user should be granted access. A modern access management technology delivers these capabilities.
  • 26
    SAP Single Sign-On
    Enhance the user experience, strengthen security, and streamline administration with simple and secure user authentication. Allow users to log in once to gain secure access to all the software they require throughout the day with no need to log in again. Offer your users a better experience, secure your data, lower help desk costs, and implement reliable, efficient encryption for all communication between client and server systems by using the SAP Single Sign-On application. Simplify your users’ everyday work and boost employee productivity by eliminating the need to perform separate log in procedures for each business application. Lower your help desk costs with significantly fewer calls for recovering passwords and unlocking accounts. Implement powerful security measures for your business-critical applications by using risk-based and two-factor authentication. Benefit from simple software rollout, configuration, and operations.
  • 27
    Thales OneWelcome Identity Platform
    The OneWelcome Cloud Identity Platform is a flexible platform that manages all your use cases for B2C, B2B and gig workers. This core platform can be expanded with a range of identity apps that combine to meet your organization’s specific needs. OneWelcome manages the European complexity of different eID’s, privacy laws, GDPR regulations, and languages for you. Our purpose is to lower the threshold for any European citizen or company that wants to connect. Create frictionless, secure and privacy protected access for your customers. Connect and protect your business-to-business ecosystem. Delegate and manage access to business partners, suppliers and your extended workforce. Get in touch to find out what the OneWelcome Cloud Identity Platform can do for your business and benefit from business enablement, operational efficiency, enhanced customer experience, improved security and facilitated compliance.
  • 28
    ManageEngine Identity Manager Plus
    A secure, single sign-on (SSO) solution for enterprises. Identity Manager Plus from ManageEngine, the IT division of Zoho, gives end users one-click access to the applications they need and allows IT admins to manage and monitor application access from one central console. Provide users with secure, one-click access to enterprise applications. Users only have to log in once to access all their applications. Enable SSO to hundreds of popular applications in our app catalog or any SAML-based internal application using custom integrations. Track who accessed which application, from where, and when. Find the applications used most, inactive users, and more. Directly import users from G Suite and Azure AD, or use the built-in Zoho Directory to onboard temporary employees and contractors. Configure SSO for applications, add users, enable application access to users, and track application access—all from a central console.
  • 29
    DruID

    DruID

    DruID

    Intelligent relationships based on Identity. Managing the unique consumer identity is fundamental to establishing long-term relationships. DRUID helps you Integrate your digital ecosystem, Consolidate your users’ data and Personalize for them amazing experiences. What is DRUID? DRUID is a platform that manages the unique identity of the consumer and access control (CIAM). DRUID allows you to integrate complex digital ecosystems with enormous flexibility, manage all points of contact dynamically, ensure compliance with the law on data protection and enrich the information of your consumers through external sources, such as social networks. RELATIONAL STRATEGY DRUID is a key piece in your consumer-centric strategy. DRUID helps you to obtain a unique consumer identity and to know better the target audience (consumers, stakeholders, customers, influencers, employees…) DRUID is key to deploying a winning strategy in 3 steps: 1. Integrate. Align the entire digital ecosystem
  • 30
    CyberArk Customer Identity
    Delight your customers with easy and secure access to your websites and apps that keep them loyal to your business. Expectations for great digital experiences are at an all-time high. Meanwhile, the attack surface is more porous than ever. With CyberArk Customer Identity, you can securely open up your websites and apps to customers with confidence. Seamless integration, intuitive access controls and frictionless sign-on experience. Privacy, consent and identity verification in one platform. Pre-built widgets and open APIs to reduce development effort. Secure access to business apps for human and machine identities. Secure access for machine identities within the DevOps pipeline. Reduce complexity and burden on IT while improving protection of the business. Provide secure single sign-on access to your apps and services.
MongoDB Logo MongoDB