Tag Archives: kerberos

You might be scratching your head over the alphabet soup in the title. Here’s the deal. Under Requirement 8: Identify and authenticate access to system components, PCI DSS defines requirements for those accessing systems that contain cardholder data that are … Continue reading

Posted in Compliance, Single Sign-On (SSO), Two Factor Authentication | Tagged , , , , , , , | Leave a comment

Recently a customer told me that some of their users access the IBM i internally with iPads through the Safari browser talking to the Apache Web server.  Even though the Web server application is configured to accept Kerberos, the iPad … Continue reading

Posted in Password Management, Single Sign-On (SSO) | Tagged , , , | Leave a comment

Q:  Do single sign on and SSO stat! only work between Microsoft Windows and IBM i? A:  Absolutely not! You can implement SSO for applications across nearly any combination of platforms.

Posted in Password Management, Single Sign-On (SSO) | Tagged , , , , , | Leave a comment

I thought it would be interesting for my first Security Bytes post of 2107 to pull together the most popular posts from 2016 based on number of readers. As an added attraction, I’ve also included the most popular post in … Continue reading

Posted in IBM i Security, Single Sign-On (SSO) | Tagged , , , , | Leave a comment

A common web server setup with an uncommon SSO hiccup Last week an SSO stat! customer called me needing some help. They had the Apache Web server on IBM i configured to use Kerberos authentication, and it had been working … Continue reading

Posted in Authentication, IBM i Security, Single Sign-On (SSO) | Tagged , , , , , | Leave a comment

Single sign-on (SSO) implementations tend to be very stable — unless you make specific system changes without planning ahead. Over the years, I’ve seen a handful problems occur more often than any others.  None of the problems are complicated or … Continue reading

Posted in Single Sign-On (SSO) | Tagged , , , | Leave a comment

It is not uncommon for us to configure a customer’s high availability system for single sign-on. Recently, though, two different customers called me after a role swap saying that SSO was not working.

Posted in High Availability, Single Sign-On (SSO) | Tagged , , , , , , , | Leave a comment

Each time you add a new user service to your computing environment, the password burden on your organization grows exponentially. Kerberos greatly simplifies password management, but understanding it is anything but simple. Most people find themselves dragged into depths of … Continue reading

Posted in Password Management, Single Sign-On (SSO) | Tagged , , , , | Leave a comment

Recently I wrote an article called Practical Uses for Enterprise Identity Mapping that appeared in IBM Systems Magazine’s AIX Extra online newsletter. It described ways to use EIM to solve problems unrelated to Single Sign-On (SSO). More recently, I discovered … Continue reading

Posted in Password Management, Single Sign-On (SSO) | Tagged , , , | Leave a comment

I’ve got good news for you. The best technology for implementing SSO — Kerberos — is something that your organization probably already owns. If you want to understand why Kerberos is a great technology on which to build your Single … Continue reading

Posted in Single Sign-On (SSO) | Tagged , , , , | Leave a comment