Tag Archives: single sign on

You might be scratching your head over the alphabet soup in the title. Here’s the deal. Under Requirement 8: Identify and authenticate access to system components, PCI DSS defines requirements for those accessing systems that contain cardholder data that are … Continue reading

Posted in Compliance, Single Sign-On (SSO), Two Factor Authentication | Tagged , , , , , , , | Leave a comment

Recently a customer told me that some of their users access the IBM i internally with iPads through the Safari browser talking to the Apache Web server.  Even though the Web server application is configured to accept Kerberos, the iPad … Continue reading

Posted in Password Management, Single Sign-On (SSO) | Tagged , , , | Leave a comment

Q:  Do single sign on and SSO stat! only work between Microsoft Windows and IBM i? A:  Absolutely not! You can implement SSO for applications across nearly any combination of platforms.

Posted in Password Management, Single Sign-On (SSO) | Tagged , , , , , | Leave a comment

I thought it would be interesting for my first Security Bytes post of 2107 to pull together the most popular posts from 2016 based on number of readers. As an added attraction, I’ve also included the most popular post in … Continue reading

Posted in IBM i Security, Single Sign-On (SSO) | Tagged , , , , | Leave a comment

A common web server setup with an uncommon SSO hiccup Last week an SSO stat! customer called me needing some help. They had the Apache Web server on IBM i configured to use Kerberos authentication, and it had been working … Continue reading

Posted in Authentication, IBM i Security, Single Sign-On (SSO) | Tagged , , , , , | Leave a comment

We’ve been hearing about Windows Server 2016 for a while now. It’s time to see what Microsoft is doing with respect to Active Directory Domain Services (AD DS) and authentication enhancements.

Posted in Announcement, Single Sign-On (SSO) | Tagged , , , | Leave a comment

  One of the things I like best about my job is that I get to see a lot of different environments using many different parts of the operating system.  This often gives me the opportunity to learn something new.

Posted in IBM i Security, Single Sign-On (SSO) | Tagged , , , , , , , | Leave a comment

Single sign-on (SSO) implementations tend to be very stable — unless you make specific system changes without planning ahead. Over the years, I’ve seen a handful problems occur more often than any others.  None of the problems are complicated or … Continue reading

Posted in Single Sign-On (SSO) | Tagged , , , | Leave a comment

Our managed SSO service, SSO stat!, includes much more than just SSO implementation and fixing any problems directly related to SSO as soon as they occur. It also covers consulting for any question or issue related to authentication. as well … Continue reading

Posted in IBM i Security, Single Sign-On (SSO) | Tagged , , , , , , | Leave a comment

It is not uncommon for us to configure a customer’s high availability system for single sign-on. Recently, though, two different customers called me after a role swap saying that SSO was not working.

Posted in High Availability, Single Sign-On (SSO) | Tagged , , , , , , , | Leave a comment