Advanced Authentication

This document provides information on how to configure Advanced Authentication for workstations that are not domain joined (e.g. meeting room laptops etc). The solution allows (domain) users to login using 2-Factor authentication instead of login with the local account. To configure you’ll have to perform the following configuration tasks: Configure the Advanced Authentication Methods and…

+ read more

By: whenz
Feb 14, 2019
9:53 am
Reads:
351
Score:
Unrated

This document provides information on how to configure Advanced Authentication with VMware View. To configure the Advanced Authentication integration with VMware View you’ll have to perform the following configuration tasks…

By: whenz
Sep 7, 2018
2:18 pm
Reads:
1,162
Score:
5

Micro Focus’s Advanced Authentication (AA) is an open framework that allows just about any authentication type to be plugged into it. With its open architecture, AA allows organizations to future proof their environment so they can always have the freedom to adopt the latest without the fear of vendor lock-in. Troy Drewry, product manager for…

+ read more

Kent Purdy
May 21, 2018
9:53 pm
Reads:
1,268
Score:
Unrated

As corporations continue their trend towards hybrid environments, IT organizations are discovering another level of complexity to their any, any, any initiatives. The reality is that for most environments hybrid isn’t as simple as cloud-only architectures. Included in the mix of hybrid complexity are the Identity and Access Management (IAM) capabilities that must span across…

+ read more

Kent Purdy
May 29, 2017
10:34 pm
Reads:
4,620
Score:
Unrated

If your digital assets are valuable…then they are vulnerable. For years, the infrastructure engineers have taken heed of this reality with the notion of a network security layer. For years this organized approach to serve as an outline from which a systematic plan is followed to maximize its services and especially security. The same value…

+ read more

Kent Purdy
May 7, 2017
10:51 pm
Reads:
3,969
Score:
Unrated

All of the ciphers listed are Forward Secrecy (FS) enabled and are highly recommended. They work with pretty much everything you could possibly run into at…

May 4, 2017
5:29 pm
Reads:
6,164
Score:
5

This cool solution explains the steps to install and configure SecureLogin Tap to Switch User feature using Advanced Authentication.

By: pvdinesh
Feb 27, 2017
2:30 pm
Reads:
2,047
Score:
Unrated

A common observation from our new NetIQ Access Manager customers is that they implemented it because of access fatigue, resulting from all the complexity of delivering a diverse set of services while keeping them secure. It’s often complex because the who, where and what of access continue to go through dramatic changes while IT’s mindset…

+ read more

Kent Purdy
Jan 16, 2017
7:25 pm
Reads:
2,870
Score:
Unrated

The Holidays are here and one of my all-time favorite traditions is catching up on my all-time favorite holiday movies. AND my ALL-TIME FAVORITE holiday movie is Elf. Buddy’s trip from the North Pole workshop down to New York City and his adventures there had me thinking about my every day grind. The day in…

+ read more

Dec 19, 2016
11:27 am
Reads:
4,525
Score:
5
Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Process Automation IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow