SAML - Tagged - Security Boulevard

How to Test SAML and Configure SSO Using a Free-to-Use Application

The days where employees sat at workstations and interacted exclusively with native applications are gone but not forgotten: the legacy […] The post How to Test SAML and Configure SSO Using a ...

What is Single Sign-On (SSO)?

What is single sign-on? Could it be that everything we thought we knew about single sign-on (SSO) over the last decade is wrong? The post What is Single Sign-On (SSO)? appeared first ...
SOGo and PacketFence Impacted by SAML Implementation Vulnerabilities

SOGo and PacketFence Impacted by SAML Implementation Vulnerabilities

Part of Akamai's incident management process for vulnerabilities in third party software involves verifying potential impact in other systems using the same or similar libraries. While following that process when addressing the ...
SAML Implementation Vulnerability Impacting Some Akamai Services

SAML Implementation Vulnerability Impacting Some Akamai Services

| | Cloud Security, SAML, security
This blog post provides an overview of a vulnerability discovered in Akamai's Enterprise Application Access (EAA) product which has been patched. This vulnerability could have allowed an actor to impersonate an authorized ...
Hackers Didn’t Only Use SolarWinds to Break In, Says CISA

Hackers Didn’t Only Use SolarWinds to Break In, Says CISA

It wasn’t just the SolarWinds supply-chain hack. There were other ways that the “Russian” hackers broke into countless government agencies and private organizations ...
Security Boulevard

SAML vs. LDAP, Access Protocol Comparison

Both SAML and LDAP are access protocols commonly used in a wide variety of organizations, but they have different use cases and areas of effectiveness. They’re both used to facilitate RADIUS communication ...

Identity Lookup – Cloud Directory Authentication without LDAP

What is Identity Lookup? Identity Lookup, or ID Lookup, is very similar to the user lookup function sometimes used in credential authentication with LDAP. It’s a tool that allows the RADIUS to ...
How to Set Up RADIUS Authentication with Google

How to Set Up RADIUS Authentication with Google

Intro It is becoming more important than ever for organizations to make the transition from antiquated pre-shared key authentication methods to RADIUS-based, 802.1x authentication for their wireless networks. However, many can find ...

SAML/SSO Authentication and Conan in Nexus Repository 3.22

Introducing the release of Nexus Repository 3.22. Our product teams are excited to announce SAML/SSO authentication for Nexus Repository Pro. In addition to SAML/SSO, this release includes proxy support for Conan native ...
https://www.sersanoconsulting.com/wp-content/uploads/2017/09/AdobeStock_155061463-Converted-copy.jpg

Why Most Are Leaving LDAP With WPA2-Enterprise Behind

For years, the credential-based network authentication standard was the Lightweight Directory Access Protocol (LDAP). The security and efficiency offered by LDAP provided the necessary protection levels for everyday WPA2-Enterprise operations. But as ...