Email Alerts
-
Securing the application layer
In this lesson, learn what the main threats are to the application layer, and how to leverage existing tools to help protect against these threats. partOfGuideSeries
-
Using IAM, password and provisioning management tools for compliance
Provisioning and password management tools can ease complexity, reduce help desk calls and save money. But they also have an added benefit: they can help with your compliance woes. Identity and Access Manag
-
Enhanced Identity and Access Management
From consolidating directories to automating provisioning and rolling out single sign-on, these sessions identify how leading organizations are strengthening authorization and enforcing access controls. Session Downloads
-
Answer page: Building an identity and access management architecture quiz
SearchSecurity Retention
-
Building an identity and access management architecture quiz
Find out how much you've learned about building an identity and access management architecture in Identity and Access Management Security School Identity and Access Manag
-
Automated provisioning of hardware and Active Directory
Learn how to utilize Active Directory to automate provisioning of hardware and Active Directory and how the provisioning market place is taking shape. Identity and Access Manag
-
Spy vs. Spy
Excerpt from Chapter 6 of Spies Among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day. Book Chapter
-
Protect Active Directory traffic with a VPN
Active Directory network traffic is mission critical and highly sensitive, and must be protected by a VPN. Feature
-
Security360: Identity management market
Analyst Mark Diodati describes the leaders of the identity management market; IBM's Joe Anthony explains Big Blue's strategy and Novell's Dale Olds on user-centric identity. Article | 08 Feb 2008
-
IBM releases simplified Tivoli Identity Manager
Big Blue is melding automated features from its lightweight Express version in what it says should simplify deployments and ease end user pain. Article | 12 Dec 2007
-
Companies share identity management struggles
While most firms are pleased with the results of their identity management implementation, they faced many initial hurdles. Article | 14 Nov 2007
-
Sun acquiring Vaau for identity management
To better serve customers preoccupied with regulatory compliance and identity management, Sun has agreed to acquire enterprise role-management vendor Vaau. Article | 13 Nov 2007
-
IBM aims identity suite at compliance, audit pains
IBM has been on a shopping spree over the last several years to beef up its Tivoli identity and access management suite. Over the summer, Big Blue rolled out the results of its acquisition with Consul Risk Management, launching the Tivoli Compliance ... Interview | 13 Sep 2007
-
Review: Sun Java System Identity Manager 7.0 'impressive'
Hot Pick: Sun Java System Identity Manager 7.0 excels with agentless connectors, scalability and amazing auditing. Article | 09 Mar 2007
-
Fending off an Active Directory attack
Whether you view the security of Active Directory as a matter of defense or of improving its configuration management, it's a system that must be protected. Article | 28 Sep 2006
-
Centrify delivers effective directory integration
Centrify's DirectControl Suite gives organizations the benefits of SSO and centralized policy management for Windows and *nix platforms with minimal hassle and good results. Article | 06 Sep 2006
-
Active directory users finding their way
Many IT shops use Microsoft Active Directory to manage network access. Some say it's difficult, but others use it to successfully handle directory services, group policy and provisioning. Article | 29 Jun 2006
-
Administering computers with registry-based Group Policy
Registry-based Group Policy settings in Microsoft Windows can serve as a secret weapon for administrators looking to restrict functionality or enforce specific configurations for computer systems on the network. Consultant and author Tony Bradley exp... Article | 02 Nov 2005
- See more News on Active Directory and LDAP Security
-
User provisioning best practices: Access recertification
User access recertification is the process of continually auditing users' permissions to make sure they have access only to what they need. Implementing recertification, however, can be challenging. Get best practices on creating a recertification pr... Tip
-
The pros and cons of deploying OpenLDAP: Windows and Unix
Randall Gamby discusses how OpenLDAP should (or shouldn't) be used in conjunction with enterprise directory implementations. Tip
-
How to perform an Active Directory security audit
As a security professional, you depend on Active Directory to provision users, but how secure is your implementation of AD itself? Learn how to perform an Active Directory security audit in this expert tip. Tip
-
Securing naming and directory services for application defense-in-depth
There are several aspects of naming and directory services when it comes to security. In this tip, part of the SearchSecurity.com Application Security School lesson, learn how to secure LDAP, as well as how application security teams can work with in... Tip
-
Directory services and beyond: The future of LDAP
From its remarkable debut in 1993 as a directory access system, LDAP has evolved to become one of the premier directory management services, rivaled only by Active Directory. But how implementable is LDAP in the current Microsoft market? Is it really... Tip
-
Enterprise role management: Trends and best practices
Enterprise role management technology is intended to help an enterprise keep tabs of who has access to various network resources, and also makes it easier to define groups of users. Joel Dubin explains how the technology integrates with RBAC and IAM ... Tip
-
Information protection: Using Windows Rights Management Services to secure data
Keeping confidential information under wraps is paramount in any business, but finding the right mix of tools or techniques is a common challenge. In this tip, contributor Tony Bradley explains how Windows Rights Management Services (WRMS) can help e... Tip
-
Utilizing Active Directory to automate provisioning
This article focuses on utilizing Active Directory and Group Policy to automate provisioning. Tip
-
Managing Active Directory Security
This excerpt is from the free e-book, The Definitive Guide to Windows 2000 Security. Tip
-
Whatis.com definition: LDAP
Whatis.com's in-depth definition of the Lightweight Directory Access Protocol. Tip
- See more Tips on Active Directory and LDAP Security
-
IMEI authentication: OK as a mobile authenticator?
Is IMEI authentication a secure choice when considering a mobile authenticator? Randall Gamby explains why it may not be a wise choice. Answer
-
Enterprise user de-provisioning best practices: How to efficiently revoke access
Misplaced or stagnant employee access can be dangerous; Randall Gamby details user provisioning best practices for setting up a system to combat this risk. Answer
-
Role-based access control: Making an enterprise RBAC implementation easier
Learn the benefits of role-based access control based on job functions of network accessing employees, and how to make an RBAC implementation easier. Answer
-
Perform a Windows Active Directory security configuration assessment
How secure is your configuration of Active Directory? Learn how to perform a security configuration assessment on such a directory in this expert response . Ask the Expert
-
OpenLDAP migration: OpenLDAP from an Active Directory schema
While integrating user provisioning products may seem like a lot of work, there are strategies to make it go smoothly. In this expert response, Randall Gamby describes how to incorporate OpenLDAP into an Active Directory schema. Ask the Expert
-
Enrolling in an Active Directory and Windows certificate authority
Learn more about the process of enrolling an enterprise in a certificate authority using Windows Server 2003 and Active Directory, as well as whether or not there is a universally accepted root CA. Ask the Expert
-
Active Directory update: User self-service security concerns
While allowing employees to update their Active Directory information themselves might sound like a great time-saver, it could cost more in the long run. Learn more about AD user self-service security concerns in this expert response from Randall Gam... Ask the Expert
-
How to grant local admin rights with Global Policy Objects
When granting local admin rights, it's important to do it securely. Learn how to use Global Policy Objects and global security groups to do it correctly. Ask the Expert
-
Choosing management for Active Directory user provisioning
Who's in charge of Active Directory user provisioning at your organization? Learn how to choose the most effective user provisioning management method from expert Randall Gamby. Ask the Expert
-
LDAP signing requirements for various directory configurations
While there is no longer a standard directory configuration, it is still possible to implement LDAP signing in most environments. Learn more about LDAP signing requirements from IAM expert Randall Gamby. Ask the Expert
- See more Expert Advice on Active Directory and LDAP Security
-
user profile
In a Windows environment, a user profile is a record of user-specific data that define the user's working environment. Definition
-
Best practices: Identity management - Part 2
Do you know how to optimize your identity management? Learn how In part 2 of Best practices: Identity management where experts Kelly Manthey and Peter Gyurko discuss how using case studies involving a Fortune 500 bank. Video
-
Using IAM tools to improve compliance
Provisioning and password management tools can ease complexity, reduce help desk calls and save money. But they also have an added benefit: They can help ease enterprise compliance woes. Video
-
IMEI authentication: OK as a mobile authenticator?
Is IMEI authentication a secure choice when considering a mobile authenticator? Randall Gamby explains why it may not be a wise choice. Answer
-
Enterprise user de-provisioning best practices: How to efficiently revoke access
Misplaced or stagnant employee access can be dangerous; Randall Gamby details user provisioning best practices for setting up a system to combat this risk. Answer
-
Role-based access control: Making an enterprise RBAC implementation easier
Learn the benefits of role-based access control based on job functions of network accessing employees, and how to make an RBAC implementation easier. Answer
-
Best practices: Identity management - Part 2
Do you know how to optimize your identity management? Learn how In part 2 of Best practices: Identity management where experts Kelly Manthey and Peter Gyurko discuss how using case studies involving a Fortune 500 bank. Video
-
User provisioning best practices: Access recertification
User access recertification is the process of continually auditing users' permissions to make sure they have access only to what they need. Implementing recertification, however, can be challenging. Get best practices on creating a recertification pr... Tip
-
The pros and cons of deploying OpenLDAP: Windows and Unix
Randall Gamby discusses how OpenLDAP should (or shouldn't) be used in conjunction with enterprise directory implementations. Tip
-
Perform a Windows Active Directory security configuration assessment
How secure is your configuration of Active Directory? Learn how to perform a security configuration assessment on such a directory in this expert response . Ask the Expert
-
How to perform an Active Directory security audit
As a security professional, you depend on Active Directory to provision users, but how secure is your implementation of AD itself? Learn how to perform an Active Directory security audit in this expert tip. Tip
-
OpenLDAP migration: OpenLDAP from an Active Directory schema
While integrating user provisioning products may seem like a lot of work, there are strategies to make it go smoothly. In this expert response, Randall Gamby describes how to incorporate OpenLDAP into an Active Directory schema. Ask the Expert
-
Enrolling in an Active Directory and Windows certificate authority
Learn more about the process of enrolling an enterprise in a certificate authority using Windows Server 2003 and Active Directory, as well as whether or not there is a universally accepted root CA. Ask the Expert
- See more All on Active Directory and LDAP Security
About Active Directory and LDAP Security
In this directory services resource, experts answer the question: what is Active Directory and LDAP? And also offer tips on how to install AD and LDAP, setup, configuration, tools, users and monitoring.
Security Management Strategies for the CIO