Manage
Learn to apply best practices and optimize your operations.
Single sign on SSO and federated identity
IAM system strategy identifies metrics that work for business
Security professionals are using identity and access management systems to track metrics on password resets, onboarding and offboarding, and employee retention and customer service. Continue Reading
OneLogin security chief delivers new security model
How did cloud identity and access management vendor OneLogin rebuild its security after a breach? We ask OneLogin security chief Justin Calmus. Continue Reading
10 unified access management questions for OneLogin CSO Justin Calmus
Enterprise security veteran Justin Calmus, who describes himself as an avid hacker, joined OneLogin as the CSO earlier this year. After last year's breach, who would want this job? Continue Reading
-
federated identity management
Federated identity management (FIM) is an arrangement that can be made between multiple enterprises to let subscribers use the same identification data to obtain access to the networks of all the enterprises in the group. Continue Reading
How does a SAML vulnerability affect single sign-on systems?
Researchers at Duo Security discovered a SAML vulnerability that enabled attackers to dupe single sign-on systems. Expert Michael Cobb explains how the exploit works. Continue Reading
Single sign-on best practices: How can enterprises get SSO right?
Proper planning is at the top of the list for single sign-on best practices, but it's important to get enterprise SSO implementations off to a good start. Here's how to do it.Continue Reading
OneLogin data breach: What does the attack mean for SSOs?
A OneLogin data breach affected all of the company's U.S. customers after threat actors abused an Amazon Web Services API. Discover what this means for customers and SSO companies.Continue Reading
How to balance organizational productivity and enterprise security
It's no secret that enterprise security and organizational productivity can often conflict. Peter Sullivan looks at the root causes and how to address the friction.Continue Reading
How to make single sign-on simple and secure
Single sign-on (SSO) has a complicated history filled with frustration and failure. Look at it just from a protocol point of view: OpenID, Security Assertion Markup Language (SAML), OAUTH, YAML, Shibboleth and so on. Of course some enterprises took ...Continue Reading
When single sign-on fails, is a second SSO implementation worthwhile?
After a failed SSO implementation, is there any benefit to an enterprise trying again? Expert Michele Chubirka discusses.Continue Reading
-
SaaS access management: Finding the best single sign-on technology
Expert Randall Gamby details key strategies for SaaS access management and contemporary single sign-on technology that's truly interoperable.Continue Reading
Readers' Choice 2010 Best Authentication Products
Readers vote on the best digital identity verification products, services, and management systems, including PKI, hardware and software tokens, smart cards.Continue Reading
Identity management SSO security: Hardening single sign-on systems
Get information on how to harden single sign-on systems for greater security in this response from IAM expert Randall Gamby.Continue Reading
How to use single sign-on (SSO) for a server configuration
Using SSO for a server configuration can be done a few different ways. Learn more in this expert response from Randall Gamby.Continue Reading
Changing times for identity management
Identity management technology is adapting to meet enterprise needs. Learn what products can improve security and ease compliance.Continue Reading