Groups Shouldn’t Live Forever

posted in: Uncategorized | 0

There’s this quote from a Dr. Who episode that has stuck with me – “We’re all stories, in the end.” It speaks to the finality that nearly everything – and everyone – eventually has its demise and becomes nothing more than folklore. And in IT, this especially rings true.  When you hear a name like Novell, Adaptec, and Lotus, or terms like Token Ring, and floppies (or any other that brings you … Read More

Password Self-Service: One Size Doesn’t Fit All

posted in: Uncategorized | 0

With users having so many passwords – both personally and professionally – and with the ability to have operating systems and browsers remember password on the user’s behalf, it’s understandable that they may find themselves forgetting their password at one time or another. They can use the age-old insecure process of calling the helpdesk, or opt for the far more efficient and security-minded method of using a Password Self-Service (PSS) solution. If … Read More

Federating Identity and IT Tasks

posted in: Uncategorized | 0

How many different sets of credentials do you need to manage to access every system, application, and resource in your environment?  Of course, some simply tie in via Active Directory (Exchange, SharePoint, SQL Server, etc.) making the answer there one, but in many cases, there are application or system-centric directories utilized – both on-prem and in the cloud – that require authentication to give you access. And no one wants to have … Read More

Securely Extending IT with Multi-Factor Authentication

posted in: Uncategorized | 0

In previous blogs, we’ve stressed the need for IT to go outside of itself and embrace application owners, line-of-business owners, and other stakeholders within your user base. These people generally have better insight into the daily needs and changes related to the applications and resources that they use and can therefore manage the access to these resources with greater accuracy than IT. Employing the help of others in this manner will actually … Read More

Defining Roles when Delegating Access

posted in: Provisioning | 0

When Active Directory first came out, we were all happy just to have a few levels of administrative granularity. There were the domain admins, a few admins over servers, local admin privileges across all the workstations, and — if you were really cutting edge — perhaps some kind of custom delegation to a specific service on a specific server. Like all aspects of IT, however, the industry has matured considerably, and we … Read More

The Real Cost of Managing Active Directory Groups

posted in: Featured | 0

In many organizations, groups are properly seen as the foundation for security and accessibility to resources and email functionality. They therefore require regular attention to ensure that they are updated properly. In some cases, this task is performed by IT when a new employee joins the company and when one leaves. In other cases, it may involve a process in which the people who have a more familiar understanding of the staff … Read More

1 2 3 4 40