SSO

The Holidays are here and one of my all-time favorite traditions is catching up on my all-time favorite holiday movies. AND my ALL-TIME FAVORITE holiday movie is Elf. Buddy’s trip from the North Pole workshop down to New York City and his adventures there had me thinking about my every day grind. The day in…

+ read more

Dec 19, 2016
11:27 am
Reads:
2,006
Score:
5

This cool solution provides information for various methods used in the mobile application development world. This is all about how the application will authenticate the user and how this information is shared with other applications without compromising credentials.

By: cstumula
Oct 25, 2016
3:05 pm
Reads:
1,841
Score:
Unrated

Updated with on-demand webinar links. Improve Engagement with External Users with SSO. Can you really “have” your cake and “eat” it too? I mean I have cake; I certainly can eat it. Simple, right? Not always. This phrase has created confusion for many years. In the very most literal form of the phrase, you can’t really retain your cake once…

Sep 9, 2016
1:04 pm
Reads:
1,521
Score:
4

Data breaches have become commonplace these days, and enterprises around the world agree that it’s not a matter of “if” but rather “when.” Complicating matters, gone are the days when your employees worked nine to five, from their desktops or laptops, or even within the walls of the office where access is delivered in a…

+ read more

Kent Purdy
Jun 30, 2016
2:09 am
Reads:
1,800
Score:
5

NAM 4.2 provides an end-user portal and a mobile client. Users can access this portal and get SSO to applications listed in the portal or access application URLs. When accessing applications, users often want to move seamlessly from their desktop to their mobile device without having to login again on the mobile device.

By: cstumula
Mar 1, 2016
1:27 pm
Reads:
1,812
Score:
Unrated

NAM 4.2 provides an end-user portal. Users can access this portal and get SSO to applications listed in the portal or access the application URLs. If users access protected resources directly, as before NAM 4.2, they have to book mark all protected resources. If there are any changes to those protected resources or federation…

By: cstumula
Feb 25, 2016
11:25 am
Reads:
1,835
Score:
Unrated

The bring-your-own-device (BYOD) trend isn’t just for the enterprise. More and more emergency responders, such as Fire & Rescue NSW and police departments around the world are extending their computer-aided-dispatch (CAD) systems to include mobile devices. CAD allows emergency dispatch personnel to share knowledge of changing events with officers in the field. In the City…

+ read more

David Shephard
Jun 4, 2015
7:55 am
Reads:
2,176
Score:
Unrated

Recently I had occasion to spend a lot of time digging into the SSO (Single Sign On) configuration for User Application. As it happened, I was starting with the IDM 4.5 version of the User Application, which uses the NetIQ OSP (One SSO Provider) framework. This opens an entire other can of worms, since OSP…

+ read more

geoffc
By: geoffc
May 28, 2015
8:45 am
Reads:
2,365
Score:
5

Google Chrome book is gaining popularity especially among education institutes for various reasons. Some are, Google offers subscription at discounted cost for educational institutes. Google Admin Console Device management is simple and easy to control devices. Google provides number of services includes Mail, Google Drive, Calendar, Messenger, etc., as complete suite of services for an Organization. Redistribution of Chromebook is easy with powerwash, this deletes all data and reinstate the device as new.

By: cstumula
Apr 24, 2015
4:48 pm
Reads:
2,309
Score:
Unrated

Remedy ARS can be a powerful tool for managing parts of the ITIL framework. A powerful tool also requires powerful access controls. NetIQ Access Manager can easily be configured to control access to Remedy while still making it less cumbersome for end users. The Remedy login form has a few “gotchas” with the way it…

+ read more

ScorpionSting
Jan 26, 2015
10:03 am
Reads:
2,670
Score:
5
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow