HOW-TO
IAM (Identity & Access Management) Vs IdP (Identity Provider)
With so many acronyms in the IT space, some clarity to the identity management space is needed. Here, we will compare IAM vs IdP.
With so many acronyms in the IT space, some clarity to the identity management space is needed. Here, we will compare IAM vs IdP.
Similar to Intune® vs AirWatch®, the heavyweight MDM battle of Intune vs MobileIron® is one to watch. Let’s evaluate the battle ringside.
Azure AD Connect fills in the gap where Active Directory slips — getting credentials outside the domain and into the cloud. Does it do anything else?
For Managed Service Providers looking for a multi-tenant Active Directory tool, they may be dismayed to hear it doesn’t exist. But, there’s an alternative.
Organizations are starting to utilize WiFi more than ever, and in order to protect users and the organization itself, IT admins are looking to RADIUS.
Per-User VLAN tagging with Meraki and JumpCloud allows admins to implement a single SSID and virtually segment it to provide role-based access to users.
When you think of CALs, think of cost. There are several factors that go into whether the bill you pay is high or low, though. See some of them here.
As more Macs® infiltrate the enterprise, IT admins are being challenged to find an identity and access management solutions for Macs.
Cost conscious IT orgs are asking: are there any viable open source identity and access management solutions on the market?
SSH key management is becoming an increasingly prevalent task for DevOps engineers and IT admins alike. SSH key management for AWS® is especially critical.
Can you manage SSH keys in Microsoft® Active Directory®? More importantly, is there a better way to securely manage your organization's SSH keys?
IT admins are looking to utilize user attributes to diferentiate their users, but they're starting to ask the question, what are user attributes?