̽»¨´óÉñ

How-To

BEST PRACTICES

The Benefits of Direct LDAP/MFA Integration

Many MFA tools require a proxy or middleware to authenticate to the LDAP directory. Learn the benefits of skipping the connector for direct authentication.

HOW-TO

What is IAM? (Identity and Access Management)

Identity and access management, or IAM, used to be much simpler. But when the cloud came along, so did a number of acronyms and complexities. What is IAM today?

HOW-TO

SSO Isn’t Identity Management

Single sign-on (SSO) has been a popular tool since the mid 2000s, but SSO is not complete identity and access management (IAM). Learn why.

HOW-TO

What is True Single Sign-On (SSO)?

True SSO should describe exactly what the name implies – the ability to leverage a single set of credentials to sign on to various resources.

BEST PRACTICES

Mitigating Hardware-Based Attacks

Hardware-based attacks are becoming more commonplace, can bypass most authentication and endpoint security systems.