Access Control

Having spent the early part of my career as a Naval Officer, I’m sometimes struck by parallels between the mechanical and digital worlds. There was a time when a majority of ships relied on steam to drive turbines for propulsion. Tremendous pressure and power was governed by a very simple device. The centrifugal governor worked…

+ read more

Travis Greene
Jan 20, 2015
9:34 am
Reads:
3,554
Score:
Unrated

The main objective of this article is to give a step by step procedure for customers to help them to configure the policies for disabled LDAP user to execute usrun command using NPUM.

ashishmrt
By: ashishmrt
Jan 7, 2014
2:54 pm
Reads:
2,325
Score:
Unrated

It seems like the number of companies embracing bring-your-own-device (BYOD) policies is growing every day, with some countries seeing double digit percent growth in the number of mobile devices each year . Some people estimate  that the amount of active mobile devices (including cellular phones) will exceed the population of the earth by 2014. But…

+ read more

David Shephard
Nov 6, 2013
8:25 am
Reads:
2,640
Score:
Unrated

This article explains how to retrieve, manipulate, and send data in a SAML assertion that is not available from the configured user store in a SAML assertion – “external data”.

pmckeith
By: pmckeith
Sep 17, 2013
1:00 pm
Reads:
5,274
Score:
5

Mobility and access from anywhere, anytime and any device continues to be a challenge for many organizations. Organizations require the flexibility of access and IT must maintain security without imposing undue inconvenience on the user, whether they be corporate employees, field employees, contractors, suppliers, customers, etc. Each role requires access to services with varying degrees…

+ read more

Aug 14, 2013
1:52 pm
Reads:
2,249
Score:
Unrated

In PUM, the Audit feature uses a store and forward mechanism, so when it connects to the agent machine, audit logs will be stored on the agent machine and forwarded to the manager. But this leads to the concern where the service could be stopped or mishandled on the agent machine. In that case audit…

+ read more

ashishmrt
By: ashishmrt
Jul 18, 2013
4:42 pm
Reads:
2,946
Score:
Unrated

Jumping straight in: 1. Security by Design Designing a new infrastructure or system is a process that’s often dominated by the technical specifications, and to large extent, rightly so. However, specifications, stated in terms of speeds and feeds, rarely describe the whole story. They often assume that security is a given, mentions of which are…

+ read more

David Shephard
Jul 11, 2013
8:44 am
Reads:
2,271
Score:
Unrated

I’ll admit it. I’m a sci-fi geek. If a story or movie has flying saucers, aliens, or space battles-I’ve probably read it or seen it. I remember being particularly spooked by the classic 1951 film The Thing from Another  World based on a 1938 short story “Who Goes There?” What I didn’t guess was that…

+ read more

wheaps
By: wheaps
Dec 11, 2012
11:26 am
Reads:
2,574
Score:
Unrated

If you’re in IT, there’s a good chance that you’re expending a lot of time and money on the latest, high-end firewalls to keep information in and intruders out. An ironic reality to that fact is that at the same time your business is transitioning their applications out to the cloud. Adding to this firewall…

+ read more

Kent Purdy
Nov 16, 2012
5:54 pm
Reads:
2,185
Score:
Unrated

It many organisations system administrators are called upon to connect our credential rich, web enabled world. Either by default because Apache instances run on servers managed by system administrators, or because Apache administrators lack depth in Light Directory Access Protocol (LDAP) and directory service knowledge. This breed of system administrator is what I refer to…

+ read more

Lawrence Kearney
Oct 22, 2012
5:17 pm
Reads:
5,515
Score:
Unrated
Active Directory Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow