Sign into GoodAccess with Okta, Microsoft Entra ID, Google, JumpCloud, or SAML. Reduce access management workload and provide convenient access to multiple business applications for your end-users with single sign-on (SSO).
Create Free AccountSee DemoNo card needed. Full onboarding support.
BENEFITS
Gain access to your secure environment and protected applications with one set of credentials.
Main benefit
Avoid fragmented, per-application access management. Manage everything in one place.
Main benefit
Experience GoodAccess via an interactive demo. Get a feel for all its features and find out why GoodAccess is the right choice for your business.
FEATURES
Gateway network
Starter is a free business VPN that creates a secure VPN infrastructure for your virtual organization. Every time a user connects, GoodAccess automatically seeks out the nearest gateway location with the lowest latency and assigns an IP address dynamically. This enables secure private browsing and encrypted remote access to IT resources for your coworkers, even if they connect through public Wi-Fi.
Threat protection
Starter comes equipped with Threat Blocker, an always-on feature that stops phishing, malware, botnets, ransomware ploys and other online security threats before they hit the user and breach your network. Learn more about GoodAccess Threat Blocker.
Goodaccess app
GoodAccess comes with one-click applications for iOS, macOS, Android, Windows and ChromeOS. No configuration is needed. Just invite your colleagues via email to create their account and get the GoodAccess app.
easy access
Allow your end-users to log into your secured IT environment with just one set of access credentials.
central access
Manage user access in one place and stay informed about your users’ access history and behavior.
reduced attacks
Replace multiple access credentials by one strong, secure set and reduce the number of points of entry for potential attackers.
Case study
Case study
Creative Dock needed to ensure ISO 27001 compliance, but they struggled to achieve the required level of security and control over their network and user devices (BYOD) with their prior remote-access solution.
Without any additional hardware, GoodAccess provided Creative Dock with full, centralized control over their infrastructure and covered up to 70% of technical security requirements of ISO 27001.
Discover why leading companies rely on GoodAccess for building their Zero Trust Architecture solutions.
Overall, the GoodAccess platform is amazing. From the administration side, the platform is incredibly user friendly and you can be up and running in a few minutes, managing users takes no time at all and the customer service is fast and very helpful. We have been with GoodAccess for a number of years with no complaints. The product is very competitive in price with its competitors.
We have been very happy with the reliability of GoodAccess. We find the connectivity and stability of connections stable, we have users across multiple countries and the experience has been very good.
GoodAccess's Zero Trust Architecture effectively secures our access to critical network infrastructure and web applications. By enabling a unified IP address for all clients, it simplifies access management and reduces network administration complexity.
GoodAccess provides fast onboarding, excellent reporting, and helpful support. It offers secure, scalable access to critical systems across a global IP reach, making it vital for managing multiple users effortlessly. The platform's user-friendly management enhances our operational efficiency and security.
Test all premium features for 14 days without limitation. No credit card required.
Connect to a gateway near your location, decide what systems to include in your secure environment.
Invite team members and set up SSO in the Control Panel. Use SSO with Okta, MS Entra ID, Google, JumpCloud, or SAML.
No card needed. Full onboarding support.
Schedule a call with the GoodAccess success manager to get all the details about our product features.
Other features
Prevent unauthorized access to your internal systems with two-factor pre-authentication and biometrics.
Extend full control over inbound connections, manage them centrally with zero hardware required.
Keep track of your user behavior, network security status, and threat activity in one place.
SSO guide
Single sign-on (SSO) is a method of logging into an online app with the access credentials of another provider. This allows users to use just one set of credentials for multiple applications, enables central management and improves user experience.
GoodAccess supports SSO with the login credentials of the following providers:
Okta
Microsoft Azure
Google Workspace
JumpCloud
Universal login (SAML)
To learn how to enable SSO in GoodAccess, follow this guide.
1. It’s easy – SSO speeds up the login process and eliminates the need to remember a password for every app. Also, it is easy for administrators to implement, as it offloads the engineering to the identity provider.
2. It improves security – SSO usually includes 2FA and adaptive authentication (also called risk-based authentication), which reduces the risk of credential spoofing.
3. It improves observability – SSO allows you to see and control which apps your end-users log into.
1. It requires high security – If an adversary cracks your SSO credentials, they gain access to all the systems that use SSO. Extra-strong passwords and MFA significantly reduce the risks.
2. Cost – Identity providers will often charge a premium price for additional security features.
SSO is an authentication method that allows access to several applications with one login. LDAP (lightweight directory access protocol) is a communication protocol that is used to facilitate SSO.
SAML (security assertion markup language) is a data authentication and authorization standard that is commonly used to configure SSO.