Monthly Archives: May 2015

Recently I wrote an article called Practical Uses for Enterprise Identity Mapping that appeared in IBM Systems Magazine’s AIX Extra online newsletter. It described ways to use EIM to solve problems unrelated to Single Sign-On (SSO). More recently, I discovered … Continue reading

Posted in Password Management, Single Sign-On (SSO) | Tagged , , , | Leave a comment