Taming IAM in the extended enterprise with Zero Trust

Enterprise User Provisioning Tools

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Reborn identity

    GM's Jarrod Jasper drives a common user profile across all systems. 

  • Active Directory Federation Services

    Active Directory Federation Services can be used to implement single sign-on and identity federation. This article examines the capabilities and processes of ADFS. 

  • An introduction to Active Directory Federation Services

    Brien M. Posey discusses key features of Microsofts's Active Directory Federation Services and how it works. 

  • Security concerns of extended schema in Active Directory

    The Active Directory default schema can be changed if needed. The presence of third-party products that do this can complicate the issue, especially when security is concerned. 

  • How to manage user permissions

    Managing multiple user permissions can be a daunting task. Learn best practices for managing these permissions including servicing account passwords, granting local admin access, permissions for files and shares and other access related requests, in ... 

  • Identity crisis solved: Tips from a top identity management expert

    General Motors and its Chief Architect of Identity Management, Jarrod Jasper, reduced user profiles from 40 to one. Get tips on how they did it. Plus, find out more about PCI 101, how the credit card association believes how it can help reduce credit... 

  • Can a non-administrator change the local administrator password on 50 workstations?

    In this network security Ask the Expert Q&A our resident expert discusses if it's possible to use the login script to change the local admin password. 

  • Maturing federated ID market shows security promise

    Until recently, investing in an federated identity management product didn't always make sense, as the technology was hardly mature enough for enterprise-wide adoption. These days, vendors small and large have viable products to fill all sorts of nee... 

  • Creating secure passwords you don't have to remember

    It's easy to tell users to create strong passwords, but hard to get them to do it. And when they do, it's common to see them written on a sticky note attached to someone's monitor. So what's the answer? It might be an online application that promises... 

  • Jelly Belly sweetens remote access

    Candy-maker Jelly Belly's network was so secure even top executives couldn't get in through the VPN. The company solved the sticky situation with innovative new appliances.