What is Certificate Lifecycle Management?
Using X.509 digital certificates for authentication is an immediate and significant upgrade to credential (password) authentication, but it requires proper support infrastructure. Certificate Lifecycle Management systems (CLM/CLMS), also called Certificate Management Systems (CMS), provide that support. They allow admins to ... Read More The post What is Certificate Lifecycle Management? ... Read More
What is NAS-ID?
The Network Access Server (NAS) is the frontline of authentication – it’s the first server that fields network authentication requests before they pass through to the RADIUS. The NAS Identifier (NAS-ID) is a feature that allows the RADIUS server to ... Read More The post What is NAS-ID? appeared first ... Read More
Dynamic RADIUS VLAN Assignment for VPN
One quarter of all internet users in the world used a VPN in the last month to protect their identity privacy and their data privacy while accessing the internet. Are your organization’s users included in that stat? You simply can’t ... Read More The post Dynamic RADIUS VLAN Assignment for ... Read More
Can I use Azure AD with LDAP?
Is Azure AD compatible with LDAP? To make a long story short: Kinda, but it’s not worth the effort because there are better solutions. Want more details about why LDAP doesn’t work with Azure and the best workaround for LDAP ... Read More The post Can I use Azure AD ... Read More
What is VLAN Steering?
The VLAN (Virtual Local Area Network) is an important tool in the IT toolbox. By emulating the properties of a Local Area Network, you can segment users into any number of virtual networks and apply policies to swaths of users ... Read More The post What is VLAN Steering? appeared ... Read More
How to Choose a Managed Cloud PKI
As cloud technology and reliability continue to surpass their on-premise counterparts, more than 50% of organizations have made the switch to managed cloud PKI or plan to soon. If your organization isn’t counted among that number yet, you’re missing out ... Read More The post How to Choose a Managed ... Read More
Okta Smartcard Authentication Expanded
Okta is a popular choice for organizations that want top-of-the-line cloud identity management. It’s one of the largest identity providers with a modern cloud directory and a plethora of handy features and useful integrations. In the quest to enhance ... Read More The post Okta Smartcard Authentication Expanded appeared ... Read More
Yubikey PIV Certificate Slot Configuration
What are Certificate Slots? Physical security tokens like the Yubikey have smartcards that can be configured to store a number of certificates, the quantity of which depends on the specifications of the secure cryptoprocessor that is the heart of the ... Read More The post Yubikey PIV Certificate Slot Configuration ... Read More
YubiKey PIN/PUK Configuration at Scale
Yubikeys are an all-in-one MFA device. In addition to serving as a physical authentication token, they can generate one-time-passwords (OTP) and require users to input a PIN. It’s quite difficult to enable all of these methods of authentication and have ... Read More The post YubiKey PIN/PUK Configuration at Scale ... Read More
Dynamic RADIUS Policy Enforcement with Static Certificates
Certificate-based WPA2-Enterprise networks are extremely secure, but x.509 digital certificates can be a hassle to manage. Although SecureW2 has one of the best certificate management platforms in the industry, we’re always looking for ways to make EAP-TLS authentication safer and ... Read More The post Dynamic RADIUS Policy Enforcement with ... Read More

