BEST PRACTICES
The Difference Between LDAP and SAML SSO
Leveraging a combination of authentication protocols gives most organizations access to more types of IT resources, which can ultimately support their business objectives better.
Leveraging a combination of authentication protocols gives most organizations access to more types of IT resources, which can ultimately support their business objectives better.
Compare passwordless authentication with MFA, learn about ̽»¨´óÉñ’s authentication tools, and decide which is best for you.
Whitelist the ̽»¨´óÉñ Protect app in Focus’s settings within iOS to avoid missing MFA push notifications.
Don’t buy a new server … you’ll save a lot of money, and you’ll get more out of ̽»¨´óÉñ.
If you aren’t using two-factor authentication, you’re taking a huge security risk. Learn what 2FA is, how it works, and why you need it.
Saying you want to implement passwordless authentication and doing it are two different things. In this piece, we cover several realistic challenges of passwordless authentication and the benefits it confers in terms of security, convenience, and overall user experience.
Examples of passwordless authentication methods include possessive factors, biometric factors, or magic links. Learn more.
Learn the basics of PKI (Public Key Infrastructure), including how it works and why it's important for IT security.
Evaluate Microsoft ADFS pricing and take note of hidden costs to decide if AD + ADFS is the right IAM solution for you.
Enable remote users to work with MS SQL Server over a VPN without using a domain controller or passing credentials over the web.
Passwordless authentication is a method of verifying identity via factors that are safer than passwords. Learn more in this post.
Attribute-based access control (ABAC) provides an instant cross-check of users within a group to the apps and resources they need.