WiFi Authentication

Definition of WiFi Authentication

Many people take WiFi for granted due to its ubiquity, but that doesn’t change the fact that it is one of the most wide reaching innovations of the modern era. The convenience of connecting wirelessly to a network has had an incredible effect on users, IT admins, and cost. But, ... Read More
Definition of Multu-factor Authentication

Definition of Multi-factor Authentication

With data breaches taking up headlines from Wired to the New York Times, it is now more important than ever to secure user identities. It is estimated that breaches will cost companies $2.1 trillion in 2019. That’s enough money to buy Apple—twice. Because compromised identities contribute to the majority of ... Read More
Okta Review

Okta® Review

A quick Okta® review reveals that the company is one of the leading web application single sign-on (also called SSO) solutions available. Okta pioneered the first generation Identity-as-a-Service (IDaaS) category, which is essentially web app SSO in the cloud. While there existed a generation of on-prem SSO players in the ... Read More
Defining LDAP

Definition of LDAP

LDAP, aka the Lightweight Directory Access Protocol, is a staple in the IT industry. Part of the reason for its status results from LDAP’s development all the way back in the early 1990s, when Tim Howes and his colleagues were at the University of Michigan. LDAP provided relative ease of ... Read More
Comparing Ping Identity and JumpCloud

Comparing Ping Identity® and JumpCloud®

Comparing Ping Identity® and JumpCloud® Directory-as-a-Service® isn’t really an apples to apples comparison. Each identity management solution has the ability to access different types of IT resources, so comparing them is not really giving you the best perspective on each one. Fundamentally, the comparison is between web application single sign-on ... Read More
Hosted Cloud AD

Hosted Cloud Active Directory®

With IT administrators shifting their infrastructure to the cloud, identity management must shift as well. This shift happens when we take identity management out of the office, traditionally encapsulated within an on-prem Microsoft® Active Directory® (MAD or AD) implementation, and into the cloud. Typically, users needed to be in the ... Read More
Secure Token Disabled for a User

Secure Token is Disabled for a User

IT admins are grappling with how to manage Mac users and systems after all the changes to macOS® High Sierra. One specific example of a change made to macOS High Sierra is that Secure Token is disabled for a user. This problem affects the usage of FileVault® because without a ... Read More
AWS Cloud Directory vs Azure Active Directory

AWS® Cloud Directory vs Azure® Active Directory®

Amazon Web Services® (AWS) has been pushing their new solution dubbed, Cloud Directory. But, one of the challenges facing AWS stems from how exactly the term cloud directory is defined. So often when we hear the term directory, whether its proceeded by the word cloud or active, we begin to ... Read More