Quantcast
Channel: Enterprise IT Identity & Access Management
Browsing all 35 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Physical Access Control Technology

A typical physical access control system is made up of following components:-          ID Credential-          Door Reader-          Door Lock-          Control Panel-          Access Control Server-...

View Article



Image may be NSFW.
Clik here to view.

Microsoft Identity Integration Server 2003 Enterprise Edition - InfoWorld...

Of all the contenders here, MIIS (Microsoft Identity Integration Server) 2003 stands out in two ways. First, it's by far the cheapest, at least at first glance (more on that later). Second, it's unique...

View Article

Image may be NSFW.
Clik here to view.

Sample Code (VBScript) - Query CAPICOM

This script queries capicom com object to get cert expiration date. Capicom.dll must be installed and registered in order to run this script. If you need additional cert info, you can just add more...

View Article

Image may be NSFW.
Clik here to view.

Microsoft Customer Solutions

If no product is available (or satisfies your needs) in the marketplace, you may have to build something yourself. Currenlt, I am unable to post my own custom IT IAM solutions (such as group...

View Article

Image may be NSFW.
Clik here to view.

Review - Microsoft IAM Group Management Solution

One of group management solutions is part of Microsoft Identity and Access Management Series and you can download from:...

View Article


Image may be NSFW.
Clik here to view.

Sample Code (VBScript) - Retrieve MIIS WMI Password History

This is a sample WMI script to retrieve password change history for a specific account through MIIS. You just need to run it on MIIS server with MA name, domain name and account name as...

View Article

Image may be NSFW.
Clik here to view.

Review - MIIS SP2 Password Management Beta 1

A major new feature in MIIS SP2 is Q/A (question/answer) based password reset self service. The password management application has 4 UI compoments on top of MIIS SP2: User Registration, Password Self...

View Article

Image may be NSFW.
Clik here to view.

Microsoft Centric IAM Architecture

This is a Microsoft centric end to end B2E IAM architecture diagram. Most products are provided by Microsoft. Yellow areas form an IAM system and dependancies are in green.Identity & Access...

View Article


Image may be NSFW.
Clik here to view.

Review - BMC Identity Management for .NET

BMC IdM for .NET offers a suite of solutions in .NET environment including workflow, directory management, audit, self service, password management, Web single sign-on, and federation.  Pros:-...

View Article


Image may be NSFW.
Clik here to view.

Microsoft Internal Solutions

Micorsoft IT has implemented several internal IAM solutions and here is a list of links.Enabling Cross-Forest Identity Management with Microsoft Identity Integration Server...

View Article

Image may be NSFW.
Clik here to view.

Authentication Protocols and Standards

Some of most popular authentication protocols and standards are:·         KERBEROS v5:Kerberos is an open standard for distributed systems authentication (RFC 1510). It relies on shared secret (or...

View Article

Image may be NSFW.
Clik here to view.

How to Help Regulatory Compliance with Identity & Access Management

You can use IAM solutions to help demonstrating regulatory compliance such as SOX Section 404 and 302, HIPPA, GLB, Basel II Capital Accord, FDA 21-CFR-11, HSPD-12, EU Privacy Directive, PIPEDA, and...

View Article

Image may be NSFW.
Clik here to view.

How to Increase Productivity with Identity & Access Management

With right IAM solutions, your business can increase employee's productivity (or avoid the loss) significantly. Before you look into IAM solutions, you should identify major factors impacting...

View Article


Image may be NSFW.
Clik here to view.

How to Improve Security with Identity & Access Management

Every time I told a friend I got an IT security job, I was always asked a similar question "Do you catch hackers or virus?". Of course, the popularity of the Internet definitely puts external threats...

View Article

Image may be NSFW.
Clik here to view.

Auditing Strategy

Auditing (also referred as Audit or Accounting or Accountability) ensures that the activities associated with user access are logged for monitoring, regulatory and investigative purposes. Auditing...

View Article


Image may be NSFW.
Clik here to view.

Authorization Strategy

Authorization (or establishment or entitlement) defines a user's (or process') rights and permissions to a resource. After a user (or process) is authenticated, authorization determines what that user...

View Article

Image may be NSFW.
Clik here to view.

Authentication Strategy

Authenticationis the procedure through which a user or a device or a service (or application) provides sufficient credentials to satisfy access requirements to another service, application, or system....

View Article


Image may be NSFW.
Clik here to view.

How to Reduce TCO of Identity & Access Management

Identity & Access Management is an expensive investment in IT. Here are some tips to reduce Total Cost of Ownership:Follow the rule of economy of scale - If more people use the same solution, the...

View Article

Image may be NSFW.
Clik here to view.

IAM Strategy

IAM is a combination of processes, technologies, and policies enabled by software to manage digital identities in their lifecycle and specify how they are used to access resources. IAM is a superset of...

View Article

Image may be NSFW.
Clik here to view.

IAM in TwC

I attended 2006 Microsoft EE & TwC Forum recently and tried to find out if there is any relationship between IAM and TwC. It is interesting that TwC (Trustworthy Computing) has Identity and Access...

View Article
Browsing all 35 articles
Browse latest View live




Latest Images