You would want to implement a Cloud Token. Try to make the Token Provider the same as your Cloud Provider if applicable. With a Token the Administrator will have direct control over what computers and users can log into the cloud. Tokenization is ideal since it is based on a look up instead of a formula like encryption. I do not name a specific product since as I said you should use one that works with your hoster or provider.