Access Control

It’s often said that children are born negotiators. They possess a natural ability to try to get what they want though trade-offs, attempting to only do something if they get something in return. It’s less said though that children are born Information Security specialists. Surprising you might think – afterall, as marvellous as the human…

+ read more

David Mount
Jan 21, 2016
2:26 am
Reads:
1,869
Score:
Unrated

The recent cyber attack on Anthem has vexed many victims and onlookers—and not just because Anthem had information on individuals who weren’t Anthem members. Many are asking why cyber attackers would want to steal healthcare records. Is information on someone’s health condition really that valuable? While some may not think so, as a victim of…

+ read more

Travis Greene
Aug 25, 2015
8:13 am
Reads:
2,488
Score:
Unrated

This article explains how to retrieve, manipulate, and send data in a SAML assertion that is not available from the configured user store in a SAML assertion – “external data”.

pmckeith
By: pmckeith
Sep 17, 2013
1:00 pm
Reads:
6,035
Score:
5

Mobility and access from anywhere, anytime and any device continues to be a challenge for many organizations. Organizations require the flexibility of access and IT must maintain security without imposing undue inconvenience on the user, whether they be corporate employees, field employees, contractors, suppliers, customers, etc. Each role requires access to services with varying degrees…

+ read more

Aug 14, 2013
1:52 pm
Reads:
2,630
Score:
Unrated

Ever wanted to allow your users to authenticate to Novell Access Manager using their FaceBook credentials? Here’s how..

Categories: Uncategorized
Oct 27, 2010
4:00 pm
Reads:
4,890
Score:
Unrated

I’ve been doing some looking around at Squid add-ons for the first time in a long time. It appears that they’ve thinned out dramatically!

I’m specifically looking for a quota management tool which is compatible with a Squid/Dansguardian configuration. If need be, integration to just plain squid will do.

By: preycor
Jul 8, 2009
3:53 pm
Reads:
4,241
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow