Monthly Archives: April 2014

Lately I’ve been fielding a lot of questions on single sign-on (SSO) and high availability. This post provides basic advice and considerations for using these two strategies together.

Posted in High Availability, IBM i Security, Single Sign-On (SSO) | Tagged , , , , , , | Leave a comment

OR…. How I Finally Got to Use Some Really Cool EIM Security Functions to Enable SSO for a SaaS Implementation I love working on single sign-on projects that stretch the capabilities of Kerberos and EIM. Love them even more when … Continue reading

Posted in High Availability, IBM i Security, Single Sign-On (SSO) | Tagged , , , , , , | Leave a comment

Utilities tend to harden their hardware and software implementations and stick with them for a very long time — 10 years or more. This article raises concerns about utilities sticking with Windows XP now that Microsoft no longer officially supports … Continue reading

Posted in Info Security Mgmt | Tagged , , | Leave a comment

This tried and true newsletter contains many good articles as usual. Lots on the NSA, but take a look at “Choosing Secure Passwords.” Bruce Shneier always has a great point of view on anything security related!  

Posted in Info Security Mgmt | Tagged , | Leave a comment