BEST PRACTICES
Unified Access Management for Linux
For IT admins wondering if unified access management (UAM) for Linux is truly viable, this post will explore the concept in depth.
Who doesn't want to be the best? Learn more about the best practices of the identity and access management (IAM) space.
For IT admins wondering if unified access management (UAM) for Linux is truly viable, this post will explore the concept in depth.
As a secure, endpoint solution, JumpCloud has introduced a Policies feature to help IT manage systems. So, how do JumpCloud Policies work?
Is the end of life for macOS Open Directory upon us? Apple's recent announcements about the product certainly seem to point that way.
As Apple has been quietly shifting away from macOS Server, should IT organizations look to replace macOS Open Directory?
GPOs for Linux would be a dream come true for IT admins. Fortunately, JumpCloud has expanded the concept of GPOs to be cross-platform.
What is unified access management? In short, it describes that the concept of the user identity isn’t just on-prem or in the cloud.
Guest accounts are a perfect opportunity to gain a backdoor into a system. This post looks at disabling guest accounts on Windows machines.
Setting screen saver lock across your Windows fleet is a great system policy, and has never been easier thanks to JumpCloud Policies.
When it comes to Macs, there hasn't been a solid solution like GPOs, but now, there is a Mac group policy equivalent with JumpCloud.
As the world shifts to the cloud, many organizations are realizing the advantages of the SaaS IdP: Software-as-a-Service Identity Provider.
A modern approach to SaaS directory services, called Directory-as-a-Service, is helping IT to bring their IT management infrastructure to the cloud.
Synology NAS are one of the most popular NAS solutions. In this post, we’ll explain how to connect Synology NAS to a cloud identity management platform.