Learn about UserZoom single sign-on (SSO) integration.
On this page:
About UserZoom SSO integration
- To improve security, we offer our customers (subject to contract) the ability to integrate our platform with their network's Single Sign-On (SSO).
- SSO integration provides one of the most secure ways to authenticate and authorize users.
- Users can access UserZoom seamlessly without entering a password.
- This process, called Federated Login, uses your company-assigned credentials to access other services without entering multiple passwords.
- An Identity Provider (IdP) is required to authenticate users within your company.
- UserZoom SSO is compatible with Okta.
- Eliminates user fatigue from having to remember complex passwords that can be forgotten.
- No need for password reset requests.
- Avoids users storing credentials in text documents or on post-its.
- Increased productivity. Remembering and entering a password takes time!
- Authenticate users securely using strong encryption and secret keys shared between customers and UserZoom.
- No need to use password containers or spend time searching each password inside.
- Enhanced, efficient user experience at log in.
- Reduced Help Desk costs.
- Minimizes phishing attacks.
- Support for well-known standards:
- OAuth 2.0
- OpenID Connect
- SSO services are architected with high availability and resilience in mind.
- Service runs on hardened Linux hosts with automatic security patching, carefully-configured security groups, segmented VPCs, and role-based access controls, combined with many other advanced protections built into the cloud infrastructure.
- Data at rest and in motion is encrypted.
- All network communication uses TLS with at least 128-bit AES encryption.
- The connection uses TLS v1.2, is encrypted and authenticated using AES_128_GCM, and uses ECDHE_RSA as the key exchange mechanism.
- Easy integration with well-known IDP’s such as PingFederate.
How SSO improves security
Same password for multiple sites - Not as secure
- Often users use the same password for all their applications/services.
- If an attacker captures that password, it's likely they will have access to other applications/services.
Same email address with different passwords - Not as secure
- Users use the same email address and different passwords to register and login to several applications/services.
- If their email account gets hacked, it's easy for the attacker to request a new password.
SSO sign-in - Very secure
- With SSO, authentication is handled by a secure single Identity Provider (IdP) on your network.
- Login data is submitted to that IdP rather than directly to the application/service.
- If users try to connect to an insecure or rogue site, login credentials are sent to the IdP, rather than the site.
- As long as users log in to their company IdP, login credentials are safe.
Request SSO integration
All you need to do is reach out to your account manager. Once they submit an internal request to set up SSO for your account, the Support team will take over and help you with the next steps.
Please provide any feedback you have on this article. Your feedback will be used to improve the article and should take no more than 5 minutes to complete. Article evaluations will remain completely confidential unless you request a follow-up.