Single Sign-on

This article explains how you can map your organization’s AD groups to AWS IAM Roles with the help of Attribute Retrieval and Transformation (Virtual Attribute).…

Koushik Halder
Aug 16, 2017
10:05 am
Reads:
664
Score:
5

Amazon Web Service supports SAML based SSO in order to login to AWS Management Console using standard web browser. From a user’s perspective, the sign in process happens transparently. The user starts in the organization’s internal portal and ends up at the AWS Management Console, without ever having to supply the AWS credentials….

Koushik Halder
Jul 7, 2017
12:43 pm
Reads:
890
Score:
5

The Holidays are here and one of my all-time favorite traditions is catching up on my all-time favorite holiday movies. AND my ALL-TIME FAVORITE holiday movie is Elf. Buddy’s trip from the North Pole workshop down to New York City and his adventures there had me thinking about my every day grind. The day in…

+ read more

Dec 19, 2016
11:27 am
Reads:
2,483
Score:
5

The following guide shows how the NetIQ Advanced Authentication Framework (AAF) product can be enabled to accept user credentials passed in by Access Manager (NAM), so that users can single sign-on to the AAF enrollment page after having authenticated successfully to the NAM Identity server.

By: ncashell
Dec 14, 2016
11:27 am
Reads:
1,512
Score:
5

This cool solution provides information for various methods used in the mobile application development world. This is all about how the application will authenticate the user and how this information is shared with other applications without compromising credentials.

By: cstumula
Oct 25, 2016
3:05 pm
Reads:
4,157
Score:
Unrated

Updated with on-demand webinar links. Improve Engagement with External Users with SSO. Can you really “have” your cake and “eat” it too? I mean I have cake; I certainly can eat it. Simple, right? Not always. This phrase has created confusion for many years. In the very most literal form of the phrase, you can’t really retain your cake once…

Sep 9, 2016
1:04 pm
Reads:
1,762
Score:
4

Data breaches have become commonplace these days, and enterprises around the world agree that it’s not a matter of “if” but rather “when.” Complicating matters, gone are the days when your employees worked nine to five, from their desktops or laptops, or even within the walls of the office where access is delivered in a…

+ read more

Kent Purdy
Jun 30, 2016
2:09 am
Reads:
2,146
Score:
5

The bring-your-own-device (BYOD) trend isn’t just for the enterprise. More and more emergency responders, such as Fire & Rescue NSW and police departments around the world are extending their computer-aided-dispatch (CAD) systems to include mobile devices. CAD allows emergency dispatch personnel to share knowledge of changing events with officers in the field. In the City…

+ read more

David Shephard
Jun 4, 2015
7:55 am
Reads:
2,401
Score:
Unrated

Mobile devices have almost become human appendages. Look around any crowd and you’ll find someone buried in their smartphone or other mobile device, regardless of what’s going on around them. The workplace is no exception. With the adoption of mobile devices across enterprises, users have more flexibility and can potentially be more productive. However, bring-your-own-device…

+ read more

Travis Greene
Mar 26, 2015
8:08 am
Reads:
3,130
Score:
Unrated

Have you ever received a survey that you actually wanted to respond to? Not because you wanted to complain, but because it was relevant to something that interested you?” I received a survey this week from my health care provider. Based on the notable amount of transformation they have undergone these last few years I…

+ read more

Kent Purdy
Feb 10, 2015
10:12 am
Reads:
2,429
Score:
4.5
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow