{"id":16116,"date":"2023-03-06T10:15:06","date_gmt":"2023-03-06T10:15:06","guid":{"rendered":"https:\/\/www.realvnc.com\/?post_type=blog&#038;p=16116"},"modified":"2023-03-06T10:15:27","modified_gmt":"2023-03-06T10:15:27","slug":"three-ways-integrating-single-sign-on-improve-remote-access-security","status":"publish","type":"blog","link":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-integrating-single-sign-on-improve-remote-access-security\/","title":{"rendered":"Three Ways Integrating Single Sign-On Can Improve Remote Access Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"16116\" class=\"elementor elementor-16116\" data-elementor-post-type=\"blog\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-534f719a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"534f719a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1a4bd79c\" data-id=\"1a4bd79c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-27a149f9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"27a149f9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4e46b490\" data-id=\"4e46b490\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-16b3fccf elementor-widget elementor-widget-text-editor\" data-id=\"16b3fccf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Historically, I\u2019d tell you that a Single Sign-On (SSO) platform is far more beneficial as productivity enhancement to an organization than something that improves security.\u00a0 The reason is simple: SSO is about connecting users to multiple applications via a single user account.\u00a0 In a world where cybersecurity best practices demand that users have unique passwords between systems, the idea of using a single account (and, therefore, a single set of credentials) to access a wide range of corporate applications feels like it goes against the cybersecurity grain.\u00a0<\/p><p>But modern SSO solutions, such as Azure AD, are built with an organization\u2019s security stance in mind, adding on heightened risk-based security policies, multifactor authentication, conditional access, and more; all of this to ensure that the simplified user experience on the front end is equally matched with an improved state of security on the back end.<\/p><p>So, what does all this have to do with Remote Access?<\/p><p>In short, <em>a lot. <\/em><\/p><p>Start with a scenario where a threat actor has compromised a user\u2019s credentials that can be used to access an SSO platform.\u00a0 And let\u2019s say that said SSO platform gives the user entr\u00e9e to a web-based remote access solution which, in turn, provides access to an internal endpoint (which may or may not provide further access to other internal endpoints).\u00a0 This is the kind of step-by-step thinking that threat actors have; inching their way into a victim network, taking whatever access they can garner and using it as a launch point for another step in an attack, repeating the process until access to something valuable is achieved. So, putting remote access and SSO in the same room together could have an adverse effect down the road.<\/p><p>Does this mean you <em>shouldn\u2019t<\/em> use Remote Access with an SSO?\u00a0 Absolutely not.\u00a0 It just means that integrating the two creates risks that need to be mitigated by the SSO platform.<\/p><p>In fact, there are some great security enhancements that happen when you take a web-based Remote Access solution and marry it with an SSO, providing you take advantage of them.\u00a0 Let me cover three of them here, for your consideration.<\/p><h2>1. SSO Centralizes Authentication<\/h2><p>While we all know it makes sense to have a centralized identity provider (IdP), nearly every Remote Access solution supports the use of application-specific credentials that only exist within the solution itself.\u00a0 Additionally, in larger organizations that are multi-national or those that have subsidiaries, the use of multiple different solutions is a reality.\u00a0 In either case, the result is decentralized authentication.\u00a0 This puts the organization at risk because of the potential for varying credential security and authentication requirements.<\/p><p>By leveraging SSO, there is an opportunity to use a sanctioned set of password requirements, require authentication assurance levels that match the risk associated with a given account (think basic text-based MFA for a low-level user, but requiring the use of an authentication app for higher-risk user).<\/p><h2>2. SSO More Granularly Protects Remote Access<\/h2><p>Many Remote Access solutions certainly provide levels of protection around what a user can do once authenticated (regardless of who the authentication provider is). But what\u2019s needed is an ability to both centralize and improve the levels of protection.\u00a0<\/p><p>The integration of Remote Access with an SSO provider can result in a few specific security enhancements.\u00a0 First off, any Role-Based Access that the Remote Access solution may provide (e.g., differentiating user- versus admin-level sessions) can be centralized using the IdP\u2019s accounts, helping to give security teams visibility into who is allowed specific levels of access.<\/p><p>Additionally, some IdPs \u2013 such as Azure AD \u2013 can utilize their conditional access features to further restrict a user\u2019s ability to leverage Remote Access based on several of the user\u2019s connection details including (in the case of Azure AD) group membership, IP address, device used, and other real-time risk detection factors. Requests can be denied, or simply require MFA, use from an approved device, and more.<\/p><h2>3. SSO Enables Enterprise Visibility<\/h2><p>OK, so I\u2019ve already said <em>visibility<\/em> a few times in this article.\u00a0 But I can\u2019t emphasize enough how important visibility is when it comes to letting a user (that could very well be a threat actor) remotely access an internal endpoint and\/or move laterally using your Remote Access solution. \u00a0<\/p><p>SSO solutions can log when applications are requested, providing you an ability to \u2013 at a minimum \u2013 know when a specific user account is attempting to utilize your Remote Access solution across the Enterprise.\u00a0 This, matched with alerting, can be a powerful tool in the interest of ensuring any and all Remote Access use is done under the watchful eyes of security teams.<\/p><h2>Achieving Better Remote Access Security with SSO<\/h2><p>It\u2019s pretty likely that your Remote Access solution provides you with a fair amount of security features.\u00a0 But the cybersecurity stance required today can no longer survive on application-centric settings and features.\u00a0 What\u2019s needed is to upscale any and all Remote Access security with the help of an enterprise IdP and it\u2019s SSO features to bring the necessary controls up to an Enterprise level.<\/p><p>By doing so, organizations will improve the protective layers around authentication and access to the Remote Access application, increase the visibility into the application\u2019s use, all while simultaneously making it easier for users to remotely utilize such solutions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Historically, I\u2019d tell you that a Single Sign-On (SSO) platform is far more beneficial as productivity enhancement to an organization than something that improves security.\u00a0 The reason is simple: SSO is about connecting users to multiple applications via a single user account.\u00a0 In a world where cybersecurity best practices demand that users have unique passwords &#8230; <a title=\"Three Ways Integrating Single Sign-On Can Improve Remote Access Security\" class=\"read-more\" href=\"https:\/\/www.realvnc.com\/en\/blog\/three-ways-integrating-single-sign-on-improve-remote-access-security\/\" aria-label=\"Read more about Three Ways Integrating Single Sign-On Can Improve Remote Access Security\">Read more<\/a><\/p>\n","protected":false},"author":20,"featured_media":16118,"template":"","blog_category":[280,257,258],"class_list":["post-16116","blog","type-blog","status-publish","has-post-thumbnail","hentry","blog_category-featured","blog_category-security","blog_category-strategy"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Three Ways Integrating Single Sign-On Can Improve Remote Access Security<\/title>\n<meta name=\"description\" content=\"With so many organizations enabling users to access internal systems remotely, the use of SSO can actually improve remote access security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.realvnc.com\/en\/blog\/three-ways-integrating-single-sign-on-improve-remote-access-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Three Ways Integrating Single Sign-On Can Improve Remote Access Security\" \/>\n<meta property=\"og:description\" content=\"With so many organizations enabling users to access internal systems remotely, the use of SSO can actually improve remote access security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.realvnc.com\/en\/blog\/three-ways-integrating-single-sign-on-improve-remote-access-security\/\" \/>\n<meta property=\"og:site_name\" content=\"RealVNC\u00ae\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/realvnc\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-06T10:15:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/03\/Single-sign-on-SSO-VNC-Connect-RealVNC.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"999\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@realvnc\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/three-ways-integrating-single-sign-on-improve-remote-access-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/three-ways-integrating-single-sign-on-improve-remote-access-security\\\/\"},\"author\":{\"name\":\"Nick Cavalancia, 4-time Microsoft MVP\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/01b6bf08521717030ba8b5904cbdfc49\"},\"headline\":\"Three Ways Integrating Single Sign-On Can Improve Remote Access Security\",\"datePublished\":\"2023-03-06T10:15:06+00:00\",\"dateModified\":\"2023-03-06T10:15:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/three-ways-integrating-single-sign-on-improve-remote-access-security\\\/\"},\"wordCount\":901,\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/three-ways-integrating-single-sign-on-improve-remote-access-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Single-sign-on-SSO-VNC-Connect-RealVNC.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/three-ways-integrating-single-sign-on-improve-remote-access-security\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/three-ways-integrating-single-sign-on-improve-remote-access-security\\\/\",\"name\":\"Three Ways Integrating Single Sign-On Can Improve Remote Access Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/three-ways-integrating-single-sign-on-improve-remote-access-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/three-ways-integrating-single-sign-on-improve-remote-access-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Single-sign-on-SSO-VNC-Connect-RealVNC.jpg\",\"datePublished\":\"2023-03-06T10:15:06+00:00\",\"dateModified\":\"2023-03-06T10:15:27+00:00\",\"description\":\"With so many organizations enabling users to access internal systems remotely, the use of SSO can actually improve remote access security.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/three-ways-integrating-single-sign-on-improve-remote-access-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/three-ways-integrating-single-sign-on-improve-remote-access-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/three-ways-integrating-single-sign-on-improve-remote-access-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Single-sign-on-SSO-VNC-Connect-RealVNC.jpg\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Single-sign-on-SSO-VNC-Connect-RealVNC.jpg\",\"width\":1500,\"height\":999,\"caption\":\"Single sign-on SSO VNC Connect RealVNC\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/three-ways-integrating-single-sign-on-improve-remote-access-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Three Ways Integrating Single Sign-On Can Improve Remote Access Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"name\":\"RealVNC\u00ae\",\"description\":\"The world&#039;s safest remote access software\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#organization\",\"name\":\"RealVNC\u00ae\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"contentUrl\":\"https:\\\/\\\/www.realvnc.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/realvnc-logo-blue.png\",\"width\":300,\"height\":41,\"caption\":\"RealVNC\u00ae\"},\"image\":{\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/realvnc\",\"https:\\\/\\\/x.com\\\/realvnc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/realvnc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/RealVNCLtd\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/RealVNC\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.realvnc.com\\\/en\\\/#\\\/schema\\\/person\\\/01b6bf08521717030ba8b5904cbdfc49\",\"name\":\"Nick Cavalancia, 4-time Microsoft MVP\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g\",\"caption\":\"Nick Cavalancia, 4-time Microsoft MVP\"},\"description\":\"Nick Cavalancia is a four-time Microsoft MVP, has over 28 years of enterprise IT experience, is an accomplished consultant, speaker, trainer, writer, and columnist, and has achieved industry certifications including MCSE, MCT, Master CNE, and Master CNI. He has authored, co-authored and contributed to dozens of books on various technologies. Nick regularly speaks, writes and blogs for some of the most recognized tech companies today on topics including cybersecurity, cloud adoption, business continuity, and compliance.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Three Ways Integrating Single Sign-On Can Improve Remote Access Security","description":"With so many organizations enabling users to access internal systems remotely, the use of SSO can actually improve remote access security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-integrating-single-sign-on-improve-remote-access-security\/","og_locale":"en_US","og_type":"article","og_title":"Three Ways Integrating Single Sign-On Can Improve Remote Access Security","og_description":"With so many organizations enabling users to access internal systems remotely, the use of SSO can actually improve remote access security.","og_url":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-integrating-single-sign-on-improve-remote-access-security\/","og_site_name":"RealVNC\u00ae","article_publisher":"https:\/\/www.facebook.com\/realvnc","article_modified_time":"2023-03-06T10:15:27+00:00","og_image":[{"width":1500,"height":999,"url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/03\/Single-sign-on-SSO-VNC-Connect-RealVNC.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@realvnc","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-integrating-single-sign-on-improve-remote-access-security\/#article","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-integrating-single-sign-on-improve-remote-access-security\/"},"author":{"name":"Nick Cavalancia, 4-time Microsoft MVP","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/01b6bf08521717030ba8b5904cbdfc49"},"headline":"Three Ways Integrating Single Sign-On Can Improve Remote Access Security","datePublished":"2023-03-06T10:15:06+00:00","dateModified":"2023-03-06T10:15:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-integrating-single-sign-on-improve-remote-access-security\/"},"wordCount":901,"publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-integrating-single-sign-on-improve-remote-access-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/03\/Single-sign-on-SSO-VNC-Connect-RealVNC.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-integrating-single-sign-on-improve-remote-access-security\/","url":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-integrating-single-sign-on-improve-remote-access-security\/","name":"Three Ways Integrating Single Sign-On Can Improve Remote Access Security","isPartOf":{"@id":"https:\/\/www.realvnc.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-integrating-single-sign-on-improve-remote-access-security\/#primaryimage"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-integrating-single-sign-on-improve-remote-access-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/03\/Single-sign-on-SSO-VNC-Connect-RealVNC.jpg","datePublished":"2023-03-06T10:15:06+00:00","dateModified":"2023-03-06T10:15:27+00:00","description":"With so many organizations enabling users to access internal systems remotely, the use of SSO can actually improve remote access security.","breadcrumb":{"@id":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-integrating-single-sign-on-improve-remote-access-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.realvnc.com\/en\/blog\/three-ways-integrating-single-sign-on-improve-remote-access-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-integrating-single-sign-on-improve-remote-access-security\/#primaryimage","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/03\/Single-sign-on-SSO-VNC-Connect-RealVNC.jpg","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/03\/Single-sign-on-SSO-VNC-Connect-RealVNC.jpg","width":1500,"height":999,"caption":"Single sign-on SSO VNC Connect RealVNC"},{"@type":"BreadcrumbList","@id":"https:\/\/www.realvnc.com\/en\/blog\/three-ways-integrating-single-sign-on-improve-remote-access-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.realvnc.com\/en\/"},{"@type":"ListItem","position":2,"name":"Blogs","item":"https:\/\/www.realvnc.com\/en\/blog\/"},{"@type":"ListItem","position":3,"name":"Three Ways Integrating Single Sign-On Can Improve Remote Access Security"}]},{"@type":"WebSite","@id":"https:\/\/www.realvnc.com\/en\/#website","url":"https:\/\/www.realvnc.com\/en\/","name":"RealVNC\u00ae","description":"The world&#039;s safest remote access software","publisher":{"@id":"https:\/\/www.realvnc.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.realvnc.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.realvnc.com\/en\/#organization","name":"RealVNC\u00ae","url":"https:\/\/www.realvnc.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","contentUrl":"https:\/\/www.realvnc.com\/wp-content\/uploads\/2023\/05\/realvnc-logo-blue.png","width":300,"height":41,"caption":"RealVNC\u00ae"},"image":{"@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/realvnc","https:\/\/x.com\/realvnc","https:\/\/www.linkedin.com\/company\/realvnc\/","https:\/\/www.youtube.com\/RealVNCLtd","https:\/\/en.wikipedia.org\/wiki\/RealVNC"]},{"@type":"Person","@id":"https:\/\/www.realvnc.com\/en\/#\/schema\/person\/01b6bf08521717030ba8b5904cbdfc49","name":"Nick Cavalancia, 4-time Microsoft MVP","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/39ee2c0e6e815f082b788d1724827f4153716df8f8013fbe03f24ab73c6e4b89?s=96&d=mm&r=g","caption":"Nick Cavalancia, 4-time Microsoft MVP"},"description":"Nick Cavalancia is a four-time Microsoft MVP, has over 28 years of enterprise IT experience, is an accomplished consultant, speaker, trainer, writer, and columnist, and has achieved industry certifications including MCSE, MCT, Master CNE, and Master CNI. He has authored, co-authored and contributed to dozens of books on various technologies. Nick regularly speaks, writes and blogs for some of the most recognized tech companies today on topics including cybersecurity, cloud adoption, business continuity, and compliance."}]}},"_links":{"self":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/16116","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/users\/20"}],"version-history":[{"count":0,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog\/16116\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media\/16118"}],"wp:attachment":[{"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/media?parent=16116"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.realvnc.com\/en\/wp-json\/wp\/v2\/blog_category?post=16116"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}