Category: Identity

Why linking HR and IT is crucial to identity management

When it comes to provisioning and deprovisioning user accounts, IT departments often don’t know who’s who in the organisation, or who should have access to what. They rely on being fed data by human resources (HR), the custodians of employee data. But how is this managed? How can users be managed in different environments based… Read more…

How to manage partner identities better with Azure AD B2B

It’s one thing having to manage the identities of users in your organisation’s directory; how tricky must it be to add users from your partners into the mix? The task is perhaps not as great as you’d expect, thanks to Azure AD B2B. Working out the best way to interact with partners, particularly where large numbers… Read more…

Identity: the new security perimeter?

Headlines and industry publications are full of dire warnings about the latest phishing scam or malevolent machinations by cybercriminals. So naturally CISOs focus on their network perimeter in an effort to prevent such exploits. And often they fail. Why? Because no one can control criminal exploits. And with the advent of enterprise mobility and the… Read more…

Get top marks for student experience with CIAM

With application rates dropping and competition rife, getting top marks in the student experience league table is now the Holy Grail for the education sector. But with the ever-evolving student life cycle now stretching from pre-application to far beyond graduation, it’s imperative that a university’s customer identity and access management (CIAM) solution can facilitate these… Read more…

MIM Sync Engine Debugging: Should You Bother?

So far in the series, we’ve looked at why we test and how we do it. The next logical step might be a blog on how to debug your code in Sync Engine, but – since this article on MSDN covers that well enough, and since there are plenty of other blogs out there on… Read more…

Microsoft Visual Studio Team Services Demo

In my last Identity Management Testing blog, we explored and highlighted the importance of testing, and the benefits doing this could bring to your organisation. This week, before we can start any testing, I want to focus on the tools we use to document and store test results. So, before we get to running tests,… Read more…

How to avoid ‘security fatigue’ with Azure AD B2C

A recent NIST Study has found that users are experiencing ‘security fatigue’. Security fatigue is caused by users having to remember yet another password, register for yet another online service, or being told they must do (or not do) something related to IT security. The impact is poor security, which leads to cyber-attacks and lost business.… Read more…

5 Privileged Access Management (PAM) best practices

As the threat from trusted insiders continues to increase, the need for Privileged Access Management (PAM) has never been greater. Gartner reports that by 2018, 25% of organisations will review privileged activity and reduce data leakage incidents by 33%. Those businesses that aren’t planning to review their privileged activity on a regular basis and follow best… Read more…

Authentication with Azure Active Directory

Azure Active Directory allows access to a number of services, and authentication can be achieved in a number of ways. Outside of the standard deployment, there are federated options, and opportunities to provide secure access for partners and customers. Let’s have a look at how this all works…   How users authenticate with Azure AD… Read more…