Tag Archives: IBMi

Our managed SSO service, SSO stat!, includes much more than just SSO implementation and fixing any problems directly related to SSO as soon as they occur. It also covers consulting for any question or issue related to authentication. as well … Continue reading

Posted in IBM i Security, Single Sign-On (SSO) | Tagged , , , , , , | Leave a comment

It is not uncommon for us to configure a customer’s high availability system for single sign-on. Recently, though, two different customers called me after a role swap saying that SSO was not working.

Posted in High Availability, Single Sign-On (SSO) | Tagged , , , , , , , | Leave a comment

In a previous post on this topic, I discussed how to calculate the cost of a security-related project and how to compare different solutions for a given security-related project or issue.  I asserted that there are three different aspects that … Continue reading

Posted in IBM i Security, Info Security Mgmt, Information Security, Single Sign-On (SSO) | Tagged , , , , , , , , , , , | 1 Comment

On October 7th IBM Systems Magazine hosted my webcast, How to Achieve SSO in a Day: Eliminate passwords and be an IT hero. I was very happy to see the large number of people who registered, attended, and stayed online until … Continue reading

Posted in Botz Blog, Single Sign-On (SSO) | Tagged , , , , , | Leave a comment

Or…How a security expert can fall for a phishing scheme Think no one will target your business with phishing attacks?  Think again… This confession is a bit hard for me. Just recently I was the target of a phishing attack.  … Continue reading

Posted in Botz Blog, Cloud Security, IBM i Security, Info Security Mgmt, Information Security, Mobile Security, Social Engineering | Tagged , , , , , , , , , , , , | Leave a comment

The new IBM i 7.2 release brings several security-related enhancements. Two of them are the ability to use SSO from an IBM i green screen to a remote Telnet or FTP server that also supports Kerberos.

Posted in Botz Blog, IBM i Security, Information Security, Single Sign-On (SSO) | Tagged , , , , , , , , , , , , | Leave a comment

Have you ever encountered a situation where a user needed to use an application that displayed all of the rows in a file, but the user really should be restricted from seeing certain rows in that file?

Posted in Announcement, Botz Blog, Compliance, IBM i Security, Info Security Mgmt, Information Security, Mobile Security | Tagged , , , , , , , , , , , , | Leave a comment

OR….. How Jobs Get Authority to Objects Words have consequences. Saying things like “we’re going to tighten security” or “we’re going to remove public (or default) authority” or “we’re going to remove direct access to data” will almost invariably lead … Continue reading

Posted in Botz Blog, IBM i Security, Info Security Mgmt, Information Security, Mobile Security | Tagged , , , , , , , , , , | Leave a comment

Lately I’ve been fielding a lot of questions on single sign-on (SSO) and high availability. This post provides basic advice and considerations for using these two strategies together.

Posted in High Availability, IBM i Security, Single Sign-On (SSO) | Tagged , , , , , , | Leave a comment

OR…. How I Finally Got to Use Some Really Cool EIM Security Functions to Enable SSO for a SaaS Implementation I love working on single sign-on projects that stretch the capabilities of Kerberos and EIM. Love them even more when … Continue reading

Posted in High Availability, IBM i Security, Single Sign-On (SSO) | Tagged , , , , , , | Leave a comment