BEST PRACTICES
What Are the Different Types of Access Control?
Learn about discretionary, mandatory, rule-based, role-based, and attribute-based access control. Compare advantages and drawbacks of each.
Learn about discretionary, mandatory, rule-based, role-based, and attribute-based access control. Compare advantages and drawbacks of each.
What’s the difference between SAML and OAuth? It’s a common question for companies looking to extend their identities to the cloud.
In the first of our series on important macOS commands for IT admins, learn how to enable SSH on a Mac to securely access remote devices.
Leveraging a combination of authentication protocols gives most organizations access to more types of IT resources, which can ultimately support their business objectives better.
Compare passwordless authentication with MFA, learn about JumpCloud’s authentication tools, and decide which is best for you.
Whitelist the JumpCloud Protect app in Focus’s settings within iOS to avoid missing MFA push notifications.
Don’t buy a new server … you’ll save a lot of money, and you’ll get more out of JumpCloud.
If you aren’t using two-factor authentication, you’re taking a huge security risk. Learn what 2FA is, how it works, and why you need it.
Saying you want to implement passwordless authentication and doing it are two different things. In this piece, we cover several realistic challenges of passwordless authentication and the benefits it confers in terms of security, convenience, and overall user experience.
Examples of passwordless authentication methods include possessive factors, biometric factors, or magic links. Learn more.
Learn the basics of PKI (Public Key Infrastructure), including how it works and why it's important for IT security.
Evaluate Microsoft ADFS pricing and take note of hidden costs to decide if AD + ADFS is the right IAM solution for you.