Feeds

DropBox adds single sign-on

Amazon-dependent storage provider goes for the enterprise

5 things you didn’t know about cloud backup

DropBox has implemented single sign-on as the company strives to get inside enterprises before larger companies commodify its file storage technology.

Single sign-on (SSO) gives enterprise IT admins a way to manage use of DropBox by employees, the company announced on Tuesday. Alongside its introduction, DropBox has changed the name of its business-focused product from DropBox to Teams, to DropBox for Business.

SSO follows the company buffing the UI of its IT admin interface with added functions, like team data controls, to help it cozy up to admins. These moves see the consumer-favorite try to restyle itself for the enterprise, and take it closer to the territories of Box and Google.

The enterprise is an attractive area for DropBox, as it is not – yet - being commodified to the same extent as the consumer market. Just last week Amazon started to seriously compete with DropBox via an upgrade to its Cloud Drive service*.

"SSO works behind the scenes to let users sign in just once to a central identity provider, like Active Director, and securely access all their business apps, like DroBbox," the company wrote in a blog post announcing the technology. "With SSO, companies can put their existing trusted identity provider in charge of the authentication process."

The company's SSO implementation uses Security Assertion Markup Language (SAML), and will be provided by technology from DropBox partners Ping Identity, Okta, OneLogin, Centrify, and Symplified.

Though DropBox is going after enterprises, its technology may preclude many from using it: the company depends entirely on services operated by Amazon Web Services, and stores all data in US data centers, making the app a no go for organizations subject to data protection regulations, or those with fears US data-snooping laws like the Patriot Act and FISA.

DropBox is not the only storage provider to have offered single sign on. Box, a rival service, has offered SSO since 2011 via a partnership with Ping Identity, while Google also provides SSO via a SAML-based service for its web apps. ®

Bootnote

* Amazon has a tendency to apparently reproduce technologies developed or pioneered by other companies. It is able to do this because it operates the fundamental infrastructure – Amazon Web Services – on which many of these companies base their products.

Build a business case: developing custom apps

More from The Register

next story
Microsoft: Azure isn't ready for biz-critical apps … yet
Microsoft will move its own IT to the cloud to avoid $200m server bill
Shoot-em-up: Sony Online Entertainment hit by 'large scale DDoS attack'
Games disrupted as firm struggles to control network
Silicon Valley jolted by magnitude 6.1 quake – its biggest in 25 years
Did the earth move for you at VMworld – oh, OK. It just did. A lot
VMware's high-wire balancing act: EVO might drag us ALL down
Get it right, EMC, or there'll be STORAGE CIVIL WAR. Mark my words
Forrester says it's time to give up on physical storage arrays
The physical/virtual storage tipping point may just have arrived
Better be Nimble, tech giants, or mutant upstarts will make off with your sales
Usual suspects struggling to create competing products
VMware vaporises vCHS hybrid cloud service
AnD yEt mOre cRazy cAps to dEal wIth
prev story

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.