Secure Access

This document provides information on how to configure Advanced Authentication for workstations that are not domain joined (e.g. meeting room laptops etc). The solution allows (domain) users to login using 2-Factor authentication instead of login with the local account. To configure you’ll have to perform the following configuration tasks: Configure the Advanced Authentication Methods and…

+ read more

By: whenz
Feb 14, 2019
9:53 am
Reads:
254
Score:
Unrated

The Holidays are here and one of my all-time favorite traditions is catching up on my all-time favorite holiday movies. AND my ALL-TIME FAVORITE holiday movie is Elf. Buddy’s trip from the North Pole workshop down to New York City and his adventures there had me thinking about my every day grind. The day in…

+ read more

Dec 19, 2016
11:27 am
Reads:
4,445
Score:
5

If you’re attending this year’s Gartner IAM Summit, things might be a bit different than what you’re used to. I’ve attended other Gartner events this year, as well as other industry IAM-related events, and the thing I’ve noticed is that IAM is no longer on an island. Where IAM was seen as black magic by…

+ read more

Travis Greene
Nov 20, 2015
4:38 pm
Reads:
2,418
Score:
Unrated

As organizations respond to the current sea change in the way people work as well as what they use as their office, most organizations still have a ways to go in terms of keeping remote access secure and effective while at the same time reigning in costs. Although most all companies are continuing their shift…

+ read more

Kent Purdy
Jun 25, 2015
4:37 pm
Reads:
3,168
Score:
Unrated

The bring-your-own-device (BYOD) trend isn’t just for the enterprise. More and more emergency responders, such as Fire & Rescue NSW and police departments around the world are extending their computer-aided-dispatch (CAD) systems to include mobile devices. CAD allows emergency dispatch personnel to share knowledge of changing events with officers in the field. In the City…

+ read more

David Shephard
Jun 4, 2015
7:55 am
Reads:
3,167
Score:
Unrated

This is an update to my previous Cool Solution: Integrating Salesforce.com and NetIQ Access Manager using SAML2. If you are new to SAML2 and federation, you may still find my first article useful as I endeavored to explain each concept as each configuration step is described. This article is not inclusive, but an update to that article. In the years since it was written, several new features related to SAML have been added to Salesforce.com. I describe some of those here and also add some extra tips along the way.

pmckeith
By: pmckeith
Feb 11, 2014
12:29 pm
Reads:
9,043
Score:
5

This article explains how to retrieve, manipulate, and send data in a SAML assertion that is not available from the configured user store in a SAML assertion – “external data”.

pmckeith
By: pmckeith
Sep 17, 2013
1:00 pm
Reads:
7,466
Score:
5

Updated: PWM v1.6.0 has been released. PWM is an open source password self service application for LDAP directories. PWM is an ideal candidate for organizations that wish to “role their own” password self service solution, but do not wish to start from scratch.

By: jrivard
Oct 17, 2011
11:00 am
Reads:
6,542
Score:
Unrated

An update to the verry handy cool solution Sample Code – LDAPNetAddr
I found that recently our edir returned an addresstype 9 (tcp) instead of 1 (IP), which wasn’t handled correctly by the sample code. I’ve modified the code to handle these addresses correctly.

By: phavekes
Oct 29, 2010
10:32 am
Reads:
3,485
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow