Best Single Sign On Software for Centaur TBMS

Compare the Top Single Sign On Software that integrates with Centaur TBMS as of September 2024

This a list of Single Sign On software that integrates with Centaur TBMS. Use the filters on the left to add additional filters for products that have integrations with Centaur TBMS. View the products that work with Centaur TBMS in the table below.

What is Single Sign On Software for Centaur TBMS?

Single sign-on (SSO) software provides users with the authentication tools needed for signing into multiple applications with the same set of credentials. Compare and read user reviews of the best Single Sign On software for Centaur TBMS currently available using the table below. This list is updated regularly.

  • 1
    Okta

    Okta

    Okta

    One platform, infinite ways to connect to your employees and customers. Build auth into any app. Create secure, delightful experiences quickly by offloading customer identity management to Okta. Get security, scalability, reliability, and flexibility by combining Okta’s Customer Identity products to build the stack you need. Protect and enable your employees, contractors, and partners. Secure your employees—wherever they are—with Okta’s workforce identity solutions. Get the tools to secure and automate cloud journeys, with full support for hybrid environments along the way. Companies around the world trust Okta with their workforce identity.
  • 2
    Active Directory
    Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information. This data store, also known as the directory, contains information about Active Directory objects. These objects typically include shared resources such as servers, volumes, printers, and the network user and computer accounts. For more information about the Active Directory data store, see Directory data store. Security is integrated with Active Directory through logon authentication and access control to objects in the directory. With a single network logon, administrators can manage directory data and organization throughout their network, and authorized network users can access resources anywhere on the network. Policy-based administration eases the management of even the most complex network.
    Starting Price: $1 per user per month
  • Previous
  • You're on page 1
  • Next