Tag Archives: EIM

Recently I wrote an article called Practical Uses for Enterprise Identity Mapping that appeared in IBM Systems Magazine’s AIX Extra online newsletter. It described ways to use EIM to solve problems unrelated to Single Sign-On (SSO). More recently, I discovered … Continue reading

Posted in Password Management, Single Sign-On (SSO) | Tagged , , , | Leave a comment

I didn’t come up with the idea for a managed single sign-on (SSO) service. A customer did. When Botz & Associates started security consulting, only infrequently would companies request help implementing SSO. I always wondered why more companies weren’t using … Continue reading

Posted in Botz Blog, IBM i Security, Information Security, Single Sign-On (SSO) | Tagged , , , , , , , , , , | Leave a comment

Lately I’ve been fielding a lot of questions on single sign-on (SSO) and high availability. This post provides basic advice and considerations for using these two strategies together.

Posted in High Availability, IBM i Security, Single Sign-On (SSO) | Tagged , , , , , , | Leave a comment

OR…. How I Finally Got to Use Some Really Cool EIM Security Functions to Enable SSO for a SaaS Implementation I love working on single sign-on projects that stretch the capabilities of Kerberos and EIM. Love them even more when … Continue reading

Posted in High Availability, IBM i Security, Single Sign-On (SSO) | Tagged , , , , , , | Leave a comment

Thanks everyone that provided feedback on the whitepaper!  An updated version of the whitepaper is now available on the website under “Downloads”.  If you find/found it useful or interesting please send a link to your friends and colleagues!  Thanks again.

Posted in Announcement, IBM i Security, Information Security, Single Sign-On (SSO) | Tagged , , , , , , , | Leave a comment