Tag Archives: password management

Q:  Do single sign on and SSO stat! only work between Microsoft Windows and IBM i? A:  Absolutely not! You can implement SSO for applications across nearly any combination of platforms.

Posted in Password Management, Single Sign-On (SSO) | Tagged , , , , , | Leave a comment

Believe it or not, some commonly-accepted password best practices are probably counter-productive for security in the real world.

Posted in Authentication, Password Management | Tagged , , , , , | Leave a comment

The other day I was thinking about how I miss David Lettermen’s “Stupid Human” and “Stupid Pet Tricks” segments. Then I got to thinking about some of the bad security habits I continue to run into at IT shops. It … Continue reading

Posted in Information Security, Password Management, User Authority | Tagged , , , | Leave a comment

Each time you add a new user service to your computing environment, the password burden on your organization grows exponentially. Kerberos greatly simplifies password management, but understanding it is anything but simple. Most people find themselves dragged into depths of … Continue reading

Posted in Password Management, Single Sign-On (SSO) | Tagged , , , , | Leave a comment

Recently I wrote an article called Practical Uses for Enterprise Identity Mapping that appeared in IBM Systems Magazine’s AIX Extra online newsletter. It described ways to use EIM to solve problems unrelated to Single Sign-On (SSO). More recently, I discovered … Continue reading

Posted in Password Management, Single Sign-On (SSO) | Tagged , , , | Leave a comment

I’ve got good news for you. The best technology for implementing SSO — Kerberos — is something that your organization probably already owns. If you want to understand why Kerberos is a great technology on which to build your Single … Continue reading

Posted in Single Sign-On (SSO) | Tagged , , , , | Leave a comment

In a previous post on this topic, I discussed how to calculate the cost of a security-related project and how to compare different solutions for a given security-related project or issue.  I asserted that there are three different aspects that … Continue reading

Posted in IBM i Security, Info Security Mgmt, Information Security, Single Sign-On (SSO) | Tagged , , , , , , , , , , , | 1 Comment

Information security is first and foremost a business issue. As IT professionals, we need to analyze the merits of any security project based on how much the investment will benefit the organization.

Posted in Info Security Mgmt, Single Sign-On (SSO) | Tagged , , , , | 2 Comments

So you’re interested in implementing single sign-on. You know that everybody, including management, will love it. But that doesn’t mean that management will give you a blank check to implement it. Like any security project, they expect you to make … Continue reading

Posted in Single Sign-On (SSO) | Tagged , , , , | Leave a comment

  Patrick Townsend and I had a chance to catch up at COMMON earlier this year. I was psyched to learn that Townsend Security is now offering Two Factor Authentication (2FA) for the IBM i. When we started talking about … Continue reading

Posted in IBM i Security, Info Security Mgmt, Information Security, Single Sign-On (SSO), Two Factor Authentication | Tagged , , , , , , , , | Leave a comment