Author Archives: Patrick Botz
Our managed SSO service, SSO stat!, includes much more than just SSO implementation and fixing any problems directly related to SSO as soon as they occur. It also covers consulting for any question or issue related to authentication. as well … Continue reading
It is not uncommon for us to configure a customer’s high availability system for single sign-on. Recently, though, two different customers called me after a role swap saying that SSO was not working.
Each time you add a new user service to your computing environment, the password burden on your organization grows exponentially. Kerberos greatly simplifies password management, but understanding it is anything but simple. Most people find themselves dragged into depths of … Continue reading
I recently wrote a tip for IT Jungle that admonishes programmers to stop assuming that the “job user name” is the same user profile under which a job is currently executing. The article provided examples of how to retrieve the … Continue reading
Recently I wrote an article called Practical Uses for Enterprise Identity Mapping that appeared in IBM Systems Magazine’s AIX Extra online newsletter. It described ways to use EIM to solve problems unrelated to Single Sign-On (SSO). More recently, I discovered … Continue reading
Not many people realize that IBM i lets you define your own ad-hoc or application-defined special authorities. That’s not real surprising considering that neither the name of the mechanism nor the documentation says anything about special authorities.
I’m just polishing up my presentations and getting ready to head off to sunny Anaheim for the 2015 COMMON Meeting. I’ll be onsite beginning Saturday evening.
Hey everyone! Starting this month I’m going to be writing a monthly article for IBM Systems Magazine’s EXTRA online newsletter. Check out the March installment — Howdy, Partner! The Role of Application Developers in IT Security — for a look … Continue reading
I recently read an article called The Enemies of Data Security: Convenience and Collaboration, posted by Carl S. Young on the Harvard Business Review website. My experience with academic papers on information security is that most of them don’t deal … Continue reading
In a previous post on this topic, I discussed how to calculate the cost of a security-related project and how to compare different solutions for a given security-related project or issue. I asserted that there are three different aspects that … Continue reading