Cobalt Iron Adds SAML Integration To Compass Enterprise SaaS Backup Platform

Cobalt Iron, a leading provider of software-as-a-service (SaaS)-based enterprise data protection, has added support for Security Assertion Markup Language (SAML) to its Compass enterprise SaaS backup platform.

SAML, based on the standard XML markup language, is an open data format for exchanging authentication and authorization data between parties.

Through the Compass SAML integration, Cobalt Iron customers can now manage user provisioning and authentication more securely and conveniently from their preferred third-party identity provider. The new integration makes Compass a SAML service provider, with all provisioning taking place outside the environment of Compass via the identity provider’s interface. This improves Compass customers’ security and user administration in several ways.

First, it removes responsibility from Compass for storing each customer’s authentication credentials, with the identity provider acting as the single source for sensitive user authentication information. Additionally, with provisioning activities managed solely by the identity provider, Compass customers save time and money. Administrators no longer have to spend time provisioning Compass users that are already covered in the identity provider’s software.

The benefits extend to end users, who no longer have to complete another login form or change a password to access Compass. Saved having to create yet another password for another system, users have reduced risk that their accounts will be compromised or their identity stolen through phishing schemes.

You might also like...

Live Sports Production: Part 1 - New Sports Production Workflows

Welcome to Part 1 of ‘Live Sports Production’ - This new multi-part series uses a round table style format to explore the technology of live sports production with some of the industry’s leading system designers. It is a fascinating insight i…

Building Software Defined Infrastructure: Virtualization Vs Microservices

How virtualization and microservices differ, and workflows where virtualization and microservices would be used or avoided in terms of reliability, flexibility and security.

IP Security For Broadcasters: Part 8 - RADIUS Network Access

Maintaining controlled access is critical for any secure network, especially when working with high-value media in broadcast environments.

Standards: Part 25 - Designing Client-Side Video Players

Here we chart the historical development of client-side video players, describe the building blocks used to create them and the relevant standards.

Microphones: Part 5 - The Variable Directivity Microphone

The variable directivity microphone is very popular for studio work. What goes on inside is very clever and not widely appreciated.