-
Recent Posts
Recent Comments
Final Wrap Up… on How to Transform Developers in… Salvador on Big data – discussi… Nichole Gladky on Google apps constituency … Jason on Educause 2013 – first… Mike Gay on MS Office 365 for Educati… Archives
Categories
Meta
Category Archives: Identity
Provisioning to O365 cloud
So, I just spoke with a guy name Romero at the MS Tech Expo. He works EMS Identity space. I described for him our current environment, and asked him about the best way to provision identities to the O365 cloud. … Continue reading
Posted in Identity, Identity Management, Microsoft Ignite 2017
Tagged authentication, cloud, Identity Management, Security
Leave a comment
ADFS what’s new and upcoming
ADFS largest federation provider for azure ad. Released ADFS 2016. High adoption rates. Nobody likes passwords. Alpha numeric passwords are hard for humans to remember and easy for computers to guess. Use of username and passwords in extranet leads to … Continue reading
Posted in Identity, Identity Management, Microsoft Ignite 2017
Tagged Identity Management, MFA, Policy
Leave a comment
Final Wrap Up – Top Three Take Aways
I’m actually posting this from home. I was too tired to finish this in SF. Overall, I was very happy with the conference and the information it provided. It is hard to identify my top three takeaways for this conference … Continue reading
Posted in Identity, leadership, RSA Conference 2017, security, Uncategorized
Leave a comment
The quest to measure strength of function for authenticators: SOFA, So Good
Elaine Newton, Colin Soutar Key Takeaway: SOFA-B allows us to measure the efficacy of various biometric options so that they can be compared across vendors. https://pages.nist.gov/SOFA Biometrics provide a convenient way to provide security to phones. Introductino of biometrics doubled … Continue reading
Measuring Authentication: NIST 800-63 and Vectors of Trust
Sarah Squire Key takeaway: New NIST document goes over all new ways to categorize what used to be Levels of Assurance. Identity team needs to understand this standard. Level of identity vs level of security Authentication – why do we … Continue reading
Privileged Access Management: Unsticking your PAM program
Key Takeaway: Do we use TLAs for all admin functions, including our customers? Would they be willing to go to the next step to use PAM ids? *** PAM – accounts. Should be only used to access privileged systems. NOT … Continue reading
Identity Squatting: Laws, Tools and Methods for Security Professionals
Key Takeaway: Interesting session on identifying who our users are. Not much new, but interesting topic. *** When to recognize when someone is posing as someone else because they are a bad guy/black hat, or when they have legitimately changed … Continue reading
Posted in Identity, RSA Conference 2017, security, Uncategorized
Leave a comment
The Four Pillars of Identity: A solution for online success
Trends and Challenges: explosive data growth – Massive amounts of data that is being collected. Need to secure access to this data proliferation of devices – mulitple devices per user. don’t always have management policies for those devices. personal devices. … Continue reading
Posted in Identity, Identity Management, Teched2012
Leave a comment
Managing and Extending ADFS
Improvements and Enhancements in ADFS [ Interesting session. Very technical. The presenter went into details of how to configure and customize the ADFS experience. He showed how to setup config files and tricks and "hacks" to customize the user experience. … Continue reading
Posted in Identity, Identity Management, Teched2012
Leave a comment
Answers Picture Auth and AD
Just got done talking to a Microsoft AD specialist. I asked him about what I had seen this morning with the authentication on the tablet using picture auth. My question was whether they were storing finger strokes or any other … Continue reading
Posted in Identity, Identity Management, security, Teched2012
Leave a comment