Red Hat Single Sign-On

Red Hat Single Sign-On (RH-SSO) is based on the Keycloak project and enables you to secure your web applications by providing Web single sign-on (SSO) capabilities based on popular standards such as SAML 2.0, OpenID Connect and OAuth 2.0. The RH-SSO server can act as a SAML or OpenID Connect-based Identity Provider, mediating with your enterprise user directory or 3rd-party SSO provider for identity information and your applications via standards-based tokens.

Languages supported:

8.0/10 (Expert Score) ★★★★★
Product is rated as #44 in category Single Sign-On (SSO) Software
Ease of use
Support
Ease of Setup

Red Hat Single Sign-On (RH-SSO) is based on the Keycloak project and enables you to secure your web applications by providing Web single sign-on (SSO) capabilities based on popular standards such as SAML 2.0, OpenID Connect and OAuth 2.0. The RH-SSO server can act as a SAML or OpenID Connect-based Identity Provider, mediating with your enterprise user directory or 3rd-party SSO provider for identity information and your applications via standards-based tokens.

Red Hat Single Sign-On
Red Hat Single Sign-On

Show more categories

Customer Reviews

Red Hat Single Sign-On Reviews

Monika F.

Advanced user of Red Hat Single Sign-On
★★★★★
Standalone openid connection - secure sso server registration and connection

What do you like best?

Connection by the openid to the directory and folder - bookmark with the database mysql service provider access. The main leading homepage is secure by the exactly user identification with password and keycloak based organ-virtual identity.

What do you dislike?

Conclude the user inter and upper position with different positions in other networks needs some time to organize and to get a clear result. Get access by outside - desktops and mobile devices from a other position is not so easy to get it fixed simply.

Recommendations to others considering the product:

Use the main interface for internal directory access.

What problems are you solving with the product? What benefits have you realized?

Identity control of openid and protected interfaces in the main directory and also on 3rd party sites.

Review source: G2.com

Leave a reply

Your total score

B2B Software Guide