Tag Archives: kerberos

Each time you add a new user service to your computing environment, the password burden on your organization grows exponentially. Kerberos greatly simplifies password management, but understanding it is anything but simple. Most people find themselves dragged into depths of … Continue reading

Posted in Password Management, Single Sign-On (SSO) | Tagged , , , , | Leave a comment

Recently I wrote an article called Practical Uses for Enterprise Identity Mapping that appeared in IBM Systems Magazine’s AIX Extra online newsletter. It described ways to use EIM to solve problems unrelated to Single Sign-On (SSO). More recently, I discovered … Continue reading

Posted in Password Management, Single Sign-On (SSO) | Tagged , , , | Leave a comment

I’ve got good news for you. The best technology for implementing SSO — Kerberos — is something that your organization probably already owns. If you want to understand why Kerberos is a great technology on which to build your Single … Continue reading

Posted in Single Sign-On (SSO) | Tagged , , , , | Leave a comment

I didn’t come up with the idea for a managed single sign-on (SSO) service. A customer did. When Botz & Associates started security consulting, only infrequently would companies request help implementing SSO. I always wondered why more companies weren’t using … Continue reading

Posted in Botz Blog, IBM i Security, Information Security, Single Sign-On (SSO) | Tagged , , , , , , , , , , | Leave a comment

The new IBM i 7.2 release brings several security-related enhancements. Two of them are the ability to use SSO from an IBM i green screen to a remote Telnet or FTP server that also supports Kerberos.

Posted in Botz Blog, IBM i Security, Information Security, Single Sign-On (SSO) | Tagged , , , , , , , , , , , , | Leave a comment

Lately I’ve been fielding a lot of questions on single sign-on (SSO) and high availability. This post provides basic advice and considerations for using these two strategies together.

Posted in High Availability, IBM i Security, Single Sign-On (SSO) | Tagged , , , , , , | Leave a comment

OR…. How I Finally Got to Use Some Really Cool EIM Security Functions to Enable SSO for a SaaS Implementation I love working on single sign-on projects that stretch the capabilities of Kerberos and EIM. Love them even more when … Continue reading

Posted in High Availability, IBM i Security, Single Sign-On (SSO) | Tagged , , , , , , | Leave a comment

In a recent post I noted that the Target breach once again raised the idea of biometric authentication as means of improving the protection of corporate data. Yet for all of its benefits, adoption of biometric authentication within the IT … Continue reading

Posted in Biometrics, Botz Blog, Cloud Security, IBM i Security, Info Security Mgmt, Information Security, Mobile Security, Single Sign-On (SSO) | Tagged , , , , , , , , , , , , , , , , , , , | 1 Comment

IBM DB2 Web Query for i is a replacement for the venerable Query/400 utility. It is used for generating business reports from data stored in DB2 databases on IBM i. It sports a browser-based interface and can generate formatted and … Continue reading

Posted in IBM i Security, Information Security, Single Sign-On (SSO) | Tagged , , , , | Leave a comment

Thanks everyone that provided feedback on the whitepaper!  An updated version of the whitepaper is now available on the website under “Downloads”.  If you find/found it useful or interesting please send a link to your friends and colleagues!  Thanks again.

Posted in Announcement, IBM i Security, Information Security, Single Sign-On (SSO) | Tagged , , , , , , , | Leave a comment