HOW-TO
Manage Microsoft® Windows® without Active Directory®
Many IT admins don’t realize it, but you can authenticate and authorize users to a directory without Microsoft Windows, and with GPO-like policies.
Many IT admins don’t realize it, but you can authenticate and authorize users to a directory without Microsoft Windows, and with GPO-like policies.
Can you eliminate the need for Active Directory and extend Azure AD identities to Samba file servers and NAS appliances?
As many search for the right two-factor authentication (2FA) option, some are asking if there’s a free 2FA solution available.
A free domain controller is on the wish list of many IT admins, but with the shift to the cloud, the efficacy of the domain may be waning.
Okta announced Advanced Server Access to manage access to cloud and on-prem servers. Does that mean Okta now provides SSH key management?
Key escrow is a method of storing important cryptographic keys. Each key stored in an escrow system is tied to the original user.
With so many acronyms in the IT space, some clarity to the identity management space is needed. Here, we will compare IAM vs IdP.
Similar to Intune® vs AirWatch®, the heavyweight MDM battle of Intune vs MobileIron® is one to watch. Let’s evaluate the battle ringside.
What is Azure AD Connect? It’s a fair question considering Microsoft has a lot to offer in the way of […]
For Managed Service Providers looking for a multi-tenant Active Directory tool, they may be dismayed to hear it doesn’t exist. But, there’s an alternative.
Organizations are starting to utilize WiFi more than ever, and in order to protect users and the organization itself, IT admins are looking to RADIUS.
Per-User VLAN tagging with Meraki and JumpCloud allows admins to implement a single SSID and virtually segment it to provide role-based access to users.