Logo
Sign in
Product Logo
SAP Single Sign-OnSAP

Simple and secure user authentication that enhances the user experience, strengthens security, and streamlines administration.

Vendor

Vendor

SAP

Company Website

Company Website

SAP Single Sign-On2.jpg
SAP Single Sign-On.jpg
Product details

Simple and secure access to business applications

The SAP Single Sign-On application enables users to log in once to gain secure access to all the software they require throughout the day with no need to log in again.

Give users a better experience, while keeping your data secure

With SAP Single Sign-On, you can lower help desk costs and implement reliable, efficient encryption for all communication between client and server systems.

  • On-premise deployment
  • Simple and secure user access
  • Secure data communication
  • Advanced security capabilities

Key benefits

Increased user productivity

Simplify your users’ everyday work and boost employee productivity by eliminating the need to perform separate log in procedures for each business application.

Higher profits from increased cost efficiency

Lower your help desk costs with a significant reduction in support calls focused on recovering passwords and unlocking accounts.

Greater security

Implement powerful security measures for your business-critical applications by using risk-based and two-factor authentication.

Key features

Simple and secure access

  • Support single sign-on (SSO) for SAP Web applications and desktop clients, such as SAP GUI
  • Reuse existing infrastructure, such as Microsoft Active Directory, hardware security tokens, or smart cards
  • Benefit from simple software rollout, configuration, and operations

Various authentication technologies

  • Achieve fast implementation by means of Kerberos technology based on the corporate Windows domain
  • Provide SSO in a heterogeneous environment by using X.509 certificates
  • Use identity federation for cross-company scenarios with Security Assertion Markup Language (SAML) technology

Advanced security capabilities

  • Implement two-factor and risk-based authentication for critical systems and to secure access from outside the company
  • Use authentication with smart cards or radio-frequency identification (RFID) tokens
  • Profit from simplified lifecycle management of server-side certificates