Published: 20 March 2019
Analyst(s): Consult the Board Research Team
This summary contains input from thirteen members regarding the approaches they are taking to configure federation and multifactor authentication (MFA) systems to balance user experience and security. We begin this summary with an overview of whether members enforce the use of an outbound identity federation service for verification of access to SaaS applications, as well as the tool or service they use for outbound identify federation. We follow with an analysis of members' MFA requirements for SaaS applications, including the tools they use for MFA, factors of MFA they support, frequency of their interactive MFA authentication, duration of sign-in for their time-based approaches, scenarios where they bypass MFA, and whether they integrate out-of-band MFA for cloud-based applications and services. We close this summary with analysis of the tools and services members use to enable authentication rules on the basis of user behavior or analytics, as well as whether members have any authentication or access rules based on conditions or context.
©2020 Gartner, Inc. and/or its affiliates.
All rights reserved.
Gartner is a registered trademark of Gartner, Inc. and its affiliates.
This publication may not be reproduced or distributed in any form without Gartner’s prior written permission.
It consists of the opinions of Gartner’s research organization, which should not be construed as statements of fact.
While the information contained in this publication has been obtained from sources believed to be reliable, Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information.
Although Gartner research may address legal and financial issues, Gartner does not provide legal or investment advice and its research should not be construed or used as such.
Your access and use of this publication are governed by Gartner’s Usage Policy.
Gartner prides itself on its reputation for independence and objectivity.
Its research is produced independently by its research organization without input or influence from any third party.
For further information, see
Guiding Principles on Independence and Objectivity.