Securely connect to your trading partners using top-rated integration software

Cleo’s deep protocol flexibility enables robust B2B/EDI connection via security protocols, as well as integration capabilities, giving your business a competitive advantage. Browse all security protocols, including LDAP, ICAP & SAML.

Watch Demo Video
g2-tri-badges-leader-2024
LDAP

LDAP: Lightweight Directory Access Protocol

LDAP: The Lightweight Directory Access Protocol (LDAP) is TCP/IP-based open source protocol that supports two-factor authentication through the simple authentication and security layer. Dating to the late 1980s, the most recent specification version was established in 1997.

LDAP allows businesses to better manage hierarchical enterprise directories by allowing user, system, network, services, and application data to be securely shared.

Learn more
ICAP

ICAP: Internet Content Adaptation Protocol

ICAP: The Internet Content Adaptation Protocol (ICAP) provides simple vectoring for HTTP-based messages or content. The ICAP standard was proposed in 1999 and later specified in RFC 3507.

The lightweight protocol can be used to extend security capabilities in file-based integration scenarios such as connecting dataflows to antivirus scanning and quarantine applications.

ICAP also commonly supports business content filtering and data loss prevention (DLP) use cases.

Learn more
SAML XML

SAML: Security Assertion Markup Language

SAML: Security Assertion Markup Language (SAML) is an XML-based communication framework developed by OASIS for federated identity management and to allow businesses to securely exchange identity and authentication information between a security system and trusted applications. Cleo Integration Cloud offers SAML support for the ability to bring on your own, preferred authentication systems including identity providers such as OneLogin, Auth0, Azure Active Directory, and more. 

Learn more

Our credentials

Cleo is committed to providing high-quality products and services.  Cleo Integration Cloud is secure and tested against industry standards and is designed for data security and process integrity.

Cleo Credentials

Explore additional supported protocols