Security & Infrastructure
SPNEGO is a protocol designed to handle the single sign-on process between a workstation browser and a webserver. It relies on the secure Kerberos protocol which is the de-facto industry standard used in today’s Windows and Unix based servers.
SPNEGO SSO is easily installed into your Java web servers, either as plug-ins or by installing a servlet filter into one or more web applications.
SPNEGO SSO is designed to work with Active Directory for one the simple reason. Today, more than 90% of the businesses rely on a windows domain infrastructure based on Active Directory. And with Sarbanes-Oxley acts in the US and similar in the EU, businesses will be forced to handle provisioning and deprovisioning of users more strictly.
SPNEGO SSO, as the only Java based product, supports multiple Active Directory domains, as completely separate domains and as domains within a trust relation.
Read more about SPNEGO SSO and try a FREE 30 days trial at:
- an Asseco Denmark Community that is dedicated to SPNEGO SSO.
At appliedcrypto.com you can also acces additional technical information.
- Atos Origin
- Maersk Line, Container Business
- Leeds Thomas Danby
- Deutche Post
- ING Bank
- SJ (Swedish Railroad)
- Bank Coop
- Ceska Sporitelna, Savings Bank
- Mercur Assistance
- Likewise Software
- First Citizen Bank
- Euler Hermes Credit Insurance
- J.P. Morgan
- Formueforvaltning AS
- United States Government Printing Office
- Royal Bank Of Canada
- Swedish Armed Forces
Asseco Denmark have worked together with the largest Danish companies implementing business critical IT Solutions, cutting edge IT Solutions and pragmatic no nonsense IT solutions.
Asseco Denmark is a strong network of some of Denmark's most talented IT resources. Engagement, curiosity and innovative thinking ensure that we keep updated on the latest knowledge and practice.
Our clients include the largest Danish and North-European companies. They are characterized by being focused on their goals, performance effective and achieve their objectives by the use of critical IT systems.