Tag Archives: SSO Stat!

You might be scratching your head over the alphabet soup in the title. Here’s the deal. Under Requirement 8: Identify and authenticate access to system components, PCI DSS defines requirements for those accessing systems that contain cardholder data that are … Continue reading

Posted in Compliance, Single Sign-On (SSO), Two Factor Authentication | Tagged , , , , , , , | Leave a comment

Q:  Do single sign on and SSO stat! only work between Microsoft Windows and IBM i? A:  Absolutely not! You can implement SSO for applications across nearly any combination of platforms.

Posted in Password Management, Single Sign-On (SSO) | Tagged , , , , , | Leave a comment

A common web server setup with an uncommon SSO hiccup Last week an SSO stat! customer called me needing some help. They had the Apache Web server on IBM i configured to use Kerberos authentication, and it had been working … Continue reading

Posted in Authentication, IBM i Security, Single Sign-On (SSO) | Tagged , , , , , | Leave a comment

Our managed SSO service, SSO stat!, includes much more than just SSO implementation and fixing any problems directly related to SSO as soon as they occur. It also covers consulting for any question or issue related to authentication. as well … Continue reading

Posted in IBM i Security, Single Sign-On (SSO) | Tagged , , , , , , | Leave a comment

I’ve got good news for you. The best technology for implementing SSO — Kerberos — is something that your organization probably already owns. If you want to understand why Kerberos is a great technology on which to build your Single … Continue reading

Posted in Single Sign-On (SSO) | Tagged , , , , | Leave a comment

In a previous post on this topic, I discussed how to calculate the cost of a security-related project and how to compare different solutions for a given security-related project or issue.  I asserted that there are three different aspects that … Continue reading

Posted in IBM i Security, Info Security Mgmt, Information Security, Single Sign-On (SSO) | Tagged , , , , , , , , , , , | 1 Comment

I didn’t come up with the idea for a managed single sign-on (SSO) service. A customer did. When Botz & Associates started security consulting, only infrequently would companies request help implementing SSO. I always wondered why more companies weren’t using … Continue reading

Posted in Botz Blog, IBM i Security, Information Security, Single Sign-On (SSO) | Tagged , , , , , , , , , , | Leave a comment

On October 7th IBM Systems Magazine hosted my webcast, How to Achieve SSO in a Day: Eliminate passwords and be an IT hero. I was very happy to see the large number of people who registered, attended, and stayed online until … Continue reading

Posted in Botz Blog, Single Sign-On (SSO) | Tagged , , , , , | Leave a comment

The new IBM i 7.2 release brings several security-related enhancements. Two of them are the ability to use SSO from an IBM i green screen to a remote Telnet or FTP server that also supports Kerberos.

Posted in Botz Blog, IBM i Security, Information Security, Single Sign-On (SSO) | Tagged , , , , , , , , , , , , | Leave a comment

Recently I’ve written several blog posts about biometric authentication in IT Shops (see “Target Attack Leads to Discussion of Biometric Authentication“, “IT Shop Requirements for Exploiting Biometrics“, “Biometrics and SSO“).  This post discusses a couple of secondary factors.

Posted in Biometrics, Botz Blog, Cloud Security, IBM i Security, Info Security Mgmt, Information Security, Mobile Security, Single Sign-On (SSO) | Tagged , , , , , , , , , , , , , , | Leave a comment