Tag Archives: kerberos
Each time you add a new user service to your computing environment, the password burden on your organization grows exponentially. Kerberos greatly simplifies password management, but understanding it is anything but simple. Most people find themselves dragged into depths of … Continue reading
Recently I wrote an article called Practical Uses for Enterprise Identity Mapping that appeared in IBM Systems Magazine’s AIX Extra online newsletter. It described ways to use EIM to solve problems unrelated to Single Sign-On (SSO). More recently, I discovered … Continue reading
I’ve got good news for you. The best technology for implementing SSO — Kerberos — is something that your organization probably already owns. If you want to understand why Kerberos is a great technology on which to build your Single … Continue reading
I didn’t come up with the idea for a managed single sign-on (SSO) service. A customer did. When Botz & Associates started security consulting, only infrequently would companies request help implementing SSO. I always wondered why more companies weren’t using … Continue reading
The new IBM i 7.2 release brings several security-related enhancements. Two of them are the ability to use SSO from an IBM i green screen to a remote Telnet or FTP server that also supports Kerberos.
Lately I’ve been fielding a lot of questions on single sign-on (SSO) and high availability. This post provides basic advice and considerations for using these two strategies together.
OR…. How I Finally Got to Use Some Really Cool EIM Security Functions to Enable SSO for a SaaS Implementation I love working on single sign-on projects that stretch the capabilities of Kerberos and EIM. Love them even more when … Continue reading
In a recent post I noted that the Target breach once again raised the idea of biometric authentication as means of improving the protection of corporate data. Yet for all of its benefits, adoption of biometric authentication within the IT … Continue reading
IBM DB2 Web Query for i is a replacement for the venerable Query/400 utility. It is used for generating business reports from data stored in DB2 databases on IBM i. It sports a browser-based interface and can generate formatted and … Continue reading
Thanks everyone that provided feedback on the whitepaper! An updated version of the whitepaper is now available on the website under “Downloads”. If you find/found it useful or interesting please send a link to your friends and colleagues! Thanks again.