BEST PRACTICES
Single Sign-On (SSO) as a Means of Access Control and Governance
Single sign-on (SSO) is a great access control strategy - provision the proper access levels quickly and easily. See how!
Single sign-on (SSO) is a great access control strategy - provision the proper access levels quickly and easily. See how!
This tutorial outlines steps for domainless Windows file sharing for small teams who only need to grant access to a handful of end users.
Many MFA tools require a proxy or middleware to authenticate to the LDAP directory. Learn the benefits of skipping the connector for direct authentication.
Identity Management is verifying and permissioning users, and it's the secret weapon against cyber attacks. Learn why you need it.
AD FS is used to authenticate users to applications incompatible with Active Directory (AD), but it's not the only solution.
Identity and access management, or IAM, used to be much simpler. But when the cloud came along, so did a number of acronyms and complexities. What is IAM today?
Single sign-on (SSO) authentication works through the use of different protocols depending on the type of resource you need to access.
Single sign-on (SSO) has been a popular tool since the mid 2000s, but SSO is not complete identity and access management (IAM). Learn why.
̽»¨´óÉñ is an official Identity Provider (IdP) for AWS SSO identity management via our SCIM integration.
True SSO should describe exactly what the name implies – the ability to leverage a single set of credentials to sign on to various resources.
Using ̽»¨´óÉñ's Cloud LDAP, admins can authenticate users to their MySQL databases from the cloud with simplicity.
Hardware-based attacks are becoming more commonplace, can bypass most authentication and endpoint security systems.