Category Archives: Identity

Provisioning to O365 cloud

So, I just spoke with a guy name Romero at the MS Tech Expo.  He works  EMS Identity space.  I described for him our current environment, and asked him about the best way to provision identities to the O365 cloud. … Continue reading

Posted in Identity, Identity Management, Microsoft Ignite 2017 | Tagged , , , | Leave a comment

ADFS what’s new and upcoming

ADFS largest federation provider for azure ad. Released ADFS 2016.  High adoption rates. Nobody likes passwords.  Alpha numeric passwords are hard for humans to remember and easy for computers to guess.  Use of username and passwords in extranet leads to … Continue reading

Posted in Identity, Identity Management, Microsoft Ignite 2017 | Tagged , , | Leave a comment

Final Wrap Up – Top Three Take Aways

I’m actually posting this from home.  I was too tired to finish this in SF.  Overall, I was very happy with the conference and the information it provided.  It is hard to identify my top three takeaways for this conference … Continue reading

Posted in Identity, leadership, RSA Conference 2017, security, Uncategorized | Leave a comment

The quest to measure strength of function for authenticators: SOFA, So Good

Elaine Newton, Colin Soutar Key Takeaway: SOFA-B allows us to measure the efficacy of various biometric options so that they can be compared across vendors. https://pages.nist.gov/SOFA Biometrics provide a convenient way to provide security to phones.  Introductino of biometrics doubled … Continue reading

Posted in Identity, RSA Conference 2017, Uncategorized | Tagged | Leave a comment

Measuring Authentication: NIST 800-63 and Vectors of Trust

Sarah Squire Key takeaway: New NIST document goes over all new ways to categorize what used to be Levels of Assurance.  Identity team needs to understand this standard. Level of identity vs level of security Authentication – why do we … Continue reading

Posted in Identity, RSA Conference 2017, Uncategorized | Tagged , | Leave a comment

Privileged Access Management: Unsticking your PAM program

Key Takeaway: Do we use TLAs for all admin functions, including our customers?  Would they be willing to go to the next step to use PAM ids? *** PAM – accounts. Should be only used to access privileged systems.  NOT … Continue reading

Posted in Identity, RSA Conference 2017, Uncategorized | Tagged | Leave a comment

Identity Squatting: Laws, Tools and Methods for Security Professionals

Key Takeaway: Interesting session on identifying who our users are.  Not much new, but interesting topic. *** When to recognize when someone is posing as someone else because they are a bad guy/black hat, or when they have legitimately changed … Continue reading

Posted in Identity, RSA Conference 2017, security, Uncategorized | Leave a comment

The Four Pillars of Identity: A solution for online success

Trends and Challenges: explosive data growth – Massive amounts of data that is being collected.  Need to secure access to this data proliferation of devices – mulitple devices per user.  don’t always have management policies for those devices.  personal devices.  … Continue reading

Posted in Identity, Identity Management, Teched2012 | Leave a comment

Managing and Extending ADFS

Improvements and Enhancements in ADFS [ Interesting session.  Very technical.  The presenter went into details of how to configure and customize the ADFS experience. He showed how to setup config files and tricks and "hacks" to customize the user experience.  … Continue reading

Posted in Identity, Identity Management, Teched2012 | Leave a comment

Answers Picture Auth and AD

Just got done talking to a Microsoft AD specialist.  I asked him about what I had seen this morning with the authentication on the tablet using picture auth.  My question was whether they were storing finger strokes or any other … Continue reading

Posted in Identity, Identity Management, security, Teched2012 | Leave a comment