How does a SAML proxy work?
What is a SAML proxy? Is it more than the github project?
Does it work differently to any reverse proxy (for example ARR)?
Is there an equivalent for OIDC/SAML?
Collaborate Disseminate
What is a SAML proxy? Is it more than the github project?
Does it work differently to any reverse proxy (for example ARR)?
Is there an equivalent for OIDC/SAML?
Our identities are stored in a separate IdP (Azure AD in this case) and the applications are acting as Service Providers. MFA is triggered based on some rules (based on geoIP etc.). We are now about to add a new application w… Continue reading Service Provider that requires elevation
Is it true that in GCP, accounts that will be used to log in to linux machines can be provisioned in Google Cloud IAM? And if so, how is it achieved (i.e. using directory services or by amending etc files)?
We have two Azure subscription, (1) of the parent company where all the users live in Azure AD (synchronised from on premises AD), and (2) that holds the 365 apps which are dedicated to our company.
Is it possible out of th… Continue reading Azure AD – Guest user SSO to RDP
Most of the new authentication solutions (IDaaS) are focused on HTTP (for example implementing SAML and OIDC). What protocols does Active Directory support, that are not normally supported by IDaaS?
Continue reading What protocols are authenticated by Active Directory?
We are about to develop an integration with an old system which is still live . Due to technical issues it is not possible to augment the data from the old system using the browser so we are going to develop a server to serve… Continue reading Permissions API
For an organisation I work with, the policy for internally developed applications has been to use AD accounts for running services or service integrations (their AD is full of SA_AppName_purpose). Main reasons being visibilit… Continue reading Server to server- local account or IdP?
We are designing a web application for a customer and the main use case is that users will be using the system for anywhere between a few days and a few months.
The customer would like to offer users to make use of existing … Continue reading Apps removing their permissions in OAuth
My client has 5 different identity and access management solutions. Until now they have been asking each one of their suppliers to add 5 trusted parties to their IAM solution, implement different URLs that will trigger SSO etc. It is now p… Continue reading a chain of 3 federated IdPs
What is the difference between Identity Management products (such as Forefront/MIM, PicketLink, OpenIDM) and Identity Access Governance tools (such as Sailpoint,Savyint, CyberArk)?
Apologies for another one of these terminol… Continue reading Difference between IAG and IDM