Tag Archives: single sign on

Each time you add a new user service to your computing environment, the password burden on your organization grows exponentially. Kerberos greatly simplifies password management, but understanding it is anything but simple. Most people find themselves dragged into depths of … Continue reading

Posted in Password Management, Single Sign-On (SSO) | Tagged , , , , | Leave a comment

I’m just polishing up my presentations and getting ready to head off to sunny Anaheim for the 2015 COMMON Meeting. I’ll be onsite beginning Saturday evening.

Posted in Announcement | Tagged , , , | Leave a comment

I’ve got good news for you. The best technology for implementing SSO — Kerberos — is something that your organization probably already owns. If you want to understand why Kerberos is a great technology on which to build your Single … Continue reading

Posted in Single Sign-On (SSO) | Tagged , , , , | Leave a comment

Information security is first and foremost a business issue. As IT professionals, we need to analyze the merits of any security project based on how much the investment will benefit the organization.

Posted in Info Security Mgmt, Single Sign-On (SSO) | Tagged , , , , | 2 Comments

So you’re interested in implementing single sign-on. You know that everybody, including management, will love it. But that doesn’t mean that management will give you a blank check to implement it. Like any security project, they expect you to make … Continue reading

Posted in Single Sign-On (SSO) | Tagged , , , , | Leave a comment

I didn’t come up with the idea for a managed single sign-on (SSO) service. A customer did. When Botz & Associates started security consulting, only infrequently would companies request help implementing SSO. I always wondered why more companies weren’t using … Continue reading

Posted in Botz Blog, IBM i Security, Information Security, Single Sign-On (SSO) | Tagged , , , , , , , , , , | Leave a comment

On October 7th IBM Systems Magazine hosted my webcast, How to Achieve SSO in a Day: Eliminate passwords and be an IT hero. I was very happy to see the large number of people who registered, attended, and stayed online until … Continue reading

Posted in Botz Blog, Single Sign-On (SSO) | Tagged , , , , , | Leave a comment

  Patrick Townsend and I had a chance to catch up at COMMON earlier this year. I was psyched to learn that Townsend Security is now offering Two Factor Authentication (2FA) for the IBM i. When we started talking about … Continue reading

Posted in IBM i Security, Info Security Mgmt, Information Security, Single Sign-On (SSO), Two Factor Authentication | Tagged , , , , , , , , | Leave a comment

The new IBM i 7.2 release brings several security-related enhancements. Two of them are the ability to use SSO from an IBM i green screen to a remote Telnet or FTP server that also supports Kerberos.

Posted in Botz Blog, IBM i Security, Information Security, Single Sign-On (SSO) | Tagged , , , , , , , , , , , , | Leave a comment

Lately I’ve been fielding a lot of questions on single sign-on (SSO) and high availability. This post provides basic advice and considerations for using these two strategies together.

Posted in High Availability, IBM i Security, Single Sign-On (SSO) | Tagged , , , , , , | Leave a comment