Identity Lookup – Cloud Directory Authentication without LDAP

What is Identity Lookup? Identity Lookup, or ID Lookup, is very similar to the user lookup function sometimes used in credential authentication with LDAP. It’s a tool that allows the RADIUS to ...
How to Set Up RADIUS Authentication with Google

How to Set Up RADIUS Authentication with Google

Intro It is becoming more important than ever for organizations to make the transition from antiquated pre-shared key authentication methods to RADIUS-based, 802.1x authentication for their wireless networks. However, many can find ...

SAML/SSO Authentication and Conan in Nexus Repository 3.22

Introducing the release of Nexus Repository 3.22. Our product teams are excited to announce SAML/SSO authentication for Nexus Repository Pro. In addition to SAML/SSO, this release includes proxy support for Conan native ...
https://www.sersanoconsulting.com/wp-content/uploads/2017/09/AdobeStock_155061463-Converted-copy.jpg

Why Most Are Leaving LDAP With WPA2-Enterprise Behind

For years, the credential-based network authentication standard was the Lightweight Directory Access Protocol (LDAP). The security and efficiency offered by LDAP provided the necessary protection levels for everyday WPA2-Enterprise operations. But as ...

Streamline Your Network with a Single Sign-On Policy

The post Streamline Your Network with a Single Sign-On Policy appeared first on SecureW2 ...
Definition of Cloud Identity and Access Management Written Over A Woman's Face

Definition of Cloud Identity and Access Management (IAM)

Identity and access management (IAM) is a cornerstone of IT and has been for decades. Yet, with the majority of traditional on-prem IT infrastructure migrating to the cloud via vendors such as ...
SAML, The p0wnage

SAML, The p0wnage

Oh, How Sweet It Is*... via the superlative Anitian Blog, and of course - writer Rick Osgood, comes this tremendous piece - titled 'Owning SAML, in which, the p0wning of SAML, and ...
Hosted Cloud AD

Hosted Cloud Active Directory®

With IT administrators shifting their infrastructure to the cloud, identity management must shift as well. This shift happens when we take identity management out of the office, traditionally encapsulated within an on-prem ...
Owning SAML

Owning SAML

Exploiting a SAML Implementation During a recent web application test, I discovered a bug in a Security Assertion Markup Language (SAML) implementation. This bug involved an insecure implementation of a SAML feature ...
How to Configure Google Single Sign-On Integration with SAML

How to Configure Google Single Sign-On Integration with SAML

Using Security Assertion Markup Language (SAML), a user can use their managed account credentials to sign in to enterprise cloud applications via Single Sign-On (SSO). An Identity Provider (IdP) service provides administrators ...