What is SCIM Provisioning?
SCIM provisioning is an emerging concept in the identity and access management world. Here’s how it could benefit your org.
SCIM provisioning is an emerging concept in the identity and access management world. Here’s how it could benefit your org.
Computer last logon reports are essential for assessing compliance and IT security baselines. Learn how to pull them from your directory.
2FA has a few disadvantages, but is there an alternative to 2FA? There may be supplementary solutions, though none may be considered an alternative.
Explore how to use SAML XML metadata and how to take a more expansive approach to user provisioning. Start a free 30 Day Trial today.
Organizations interested in the identity management capabilities of Azure AD may find value in understanding each tier of their pricing structure.
Connecting remotely to server infrastructure is an everyday occurrence at IT and DevOps organizations. But when it comes to which […]
Windows Server provides much in terms of functionality to an organization. Here are the top 9 roles it serves, as well as alternatives to them.
Group Policy Objects (GPOs) are a powerful tool for Windows systems. But is there something similar for Mac and Linux systems?
Web application provisioning has changed dramatically in the last two decades, and new protocols have cropped up to help IT […]
There are several types of MFA, but TOTP MFA is one of the most effective. With a cloud directory service, you can enable TOTP MFA at scale.
Event logging provides useful insights for IT departments looking to audit, troubleshoot, or monitor their directory service.
Just-in-Time (JIT) provisioning can save your organization valuable time. Here’s how you can use it.