Sign up for
Posts by Topic
- Application cloud migration (4)
- Application Security (2)
- AWS (4)
- Azure Active Directory Best Practices (1)
- Best practices (3)
- Big Data (4)
- Big data insights (3)
- Cloud Computing Best Practices (11)
- Cloud Innovation (3)
- Cloud Migration (8)
- Cloud Shift (17)
- Cloud Shift Best Practices (6)
- Data intelligence (2)
- Design Patterns (1)
- Development teams (1)
- Enterprise Identity (10)
- For Developers (4)
- Google Cloud (2)
- Hadoop (2)
- IAM (16)
- Identity (5)
- Identity and Access Management (10)
- Identity and access management best practices (1)
- IdentityModel (1)
- IdentityServer3 (2)
- Indentity and Access Management Best Practices (4)
- Insider (2)
- Lift and Shift (4)
- Microsoft Azure (2)
- Programmer Productivity (1)
- QA & Testing (1)
- Technology mentorship (1)
- Technology Team Rental (8)
- Workstate (5)
- Workstate Codes (5)
- Workstate Stories (1)
Spoiler Alert: Game of Thrones Guards Secrets with IAM Strategy
By Cyanide Studio - Cyanide Studio, CC BY-SA 3.0, Link
I have to admit — it makes me a little excited to see one of my favorite television shows collide with one of my favorite topics. It’s a rare event, so you can imagine how happy I was to see The Verge article...
Windows Hello: Waving at the Future of Identity and Access Management
For most of computing history, the username and password have served as the defacto standard for user authentication. Yet, security experts have long-warned that passwords present a number of problems.
As cracking techniques have improved, longer and better passwords have been required. Good passwords are hard to remember and users will...
Workstate Codes: Using Microsoft Graph API with Azure Active Directory
Microsoft Azure contains a wide variety of cloud services, including its industry-leading platform for identity and access management. With it you can manage all of your users, groups and other identity objects in a similar way that you would an on-premise instance of Active Directory.
While the user interface (Azure...
Enterprise Identity and Access Management: Authentication vs. Authorization
In the world of Enterprise Identity and Access Management,there is a vast glossary of terms, some of which are easily confused. Maybe it's due to the similarity (e.g., authenticate, authorize, authority) or maybe it's the complex and ever-maturing landscape of IAM services, but it's not uncommon to hear words being confused...