Advanced Authentication

This document provides information on how to configure Advanced Authentication with VMware View. To configure the Advanced Authentication integration with VMware View you’ll have to perform the following configuration tasks…

By: whenz
Sep 7, 2018
2:18 pm
Reads:
584
Score:
Unrated

Micro Focus’s Advanced Authentication (AA) is an open framework that allows just about any authentication type to be plugged into it. With its open architecture, AA allows organizations to future proof their environment so they can always have the freedom to adopt the latest without the fear of vendor lock-in. Troy Drewry, product manager for…

+ read more

Kent Purdy
May 21, 2018
9:53 pm
Reads:
835
Score:
Unrated

As corporations continue their trend towards hybrid environments, IT organizations are discovering another level of complexity to their any, any, any initiatives. The reality is that for most environments hybrid isn’t as simple as cloud-only architectures. Included in the mix of hybrid complexity are the Identity and Access Management (IAM) capabilities that must span across…

+ read more

Kent Purdy
May 29, 2017
10:34 pm
Reads:
3,993
Score:
Unrated

If your digital assets are valuable…then they are vulnerable. For years, the infrastructure engineers have taken heed of this reality with the notion of a network security layer. For years this organized approach to serve as an outline from which a systematic plan is followed to maximize its services and especially security. The same value…

+ read more

Kent Purdy
May 7, 2017
10:51 pm
Reads:
3,514
Score:
Unrated

All of the ciphers listed are Forward Secrecy (FS) enabled and are highly recommended. They work with pretty much everything you could possibly run into at…

May 4, 2017
5:29 pm
Reads:
5,225
Score:
5

A common observation from our new NetIQ Access Manager customers is that they implemented it because of access fatigue, resulting from all the complexity of delivering a diverse set of services while keeping them secure. It’s often complex because the who, where and what of access continue to go through dramatic changes while IT’s mindset…

+ read more

Kent Purdy
Jan 16, 2017
7:25 pm
Reads:
2,439
Score:
Unrated

The Holidays are here and one of my all-time favorite traditions is catching up on my all-time favorite holiday movies. AND my ALL-TIME FAVORITE holiday movie is Elf. Buddy’s trip from the North Pole workshop down to New York City and his adventures there had me thinking about my every day grind. The day in…

+ read more

Dec 19, 2016
11:27 am
Reads:
3,928
Score:
5

Last time we talked about HIPAA, we said it was time to start getting serious. A number of new rules have been implemented that have increased the level of enforcement faced by healthcare organizations. In 2009 the Health Information Technology for Economic and Clinical Health (HITECH) Act passed, which addressed the privacy and security concerns…

+ read more

Kent Purdy
Nov 21, 2016
2:26 pm
Reads:
2,755
Score:
Unrated

Data breaches have become commonplace these days, and enterprises around the world agree that it’s not a matter of “if” but rather “when.” Complicating matters, gone are the days when your employees worked nine to five, from their desktops or laptops, or even within the walls of the office where access is delivered in a…

+ read more

Kent Purdy
Jun 30, 2016
2:09 am
Reads:
2,989
Score:
5
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow