Managed Identity and Access Management (IAM)

Managed identity and access management solutions are making a major impact for IT organizations. Identity management is a major part of any IT organizations management tool infrastructure, and a new…
The post Managed Identity and Access Management (I… Continue reading Managed Identity and Access Management (IAM)

Cloud IdP

Most IT management tool categories have shifted to the cloud, but not all of them. In the identity management space, the directory service has been slow to join infrastructure, applications,…
The post Cloud IdP appeared first on JumpCloud.
The post C… Continue reading Cloud IdP

Cloud IdP

Most IT management tool categories have shifted to the cloud, but not all of them. In the identity management space, the directory service has been slow to join infrastructure, applications,…
The post Cloud IdP appeared first on JumpCloud.
The post C… Continue reading Cloud IdP

Manage FreeNAS™ Access from the Cloud

When it comes to storage operating systems, one popular open source option is FreeNAS™. Many organizations leverage the FreeNAS software and appliances as their on-prem file server solution, but there…
The post Manage FreeNAS™ Access from… Continue reading Manage FreeNAS™ Access from the Cloud

Simplify QNAP, FreeNAS, & Synology Access Management

Many IT organizations have Network Attached Storage (NAS) platforms. These systems are often leverage the SMB/CIFS networking protocol and can be classified as Samba file servers. QNAP, FreeNAS, and Synology…
The post Simplify QNAP, FreeNAS, & Sy… Continue reading Simplify QNAP, FreeNAS, & Synology Access Management

Cloud Directory Samba File Server Authentication

Many IT admins today are looking to move their IT infrastructure to the cloud. That includes their compute infrastructure, applications, data storage, and more. Unfortunately, not all of their IT…
The post Cloud Directory Samba File Server Authentica… Continue reading Cloud Directory Samba File Server Authentication

Reverse connection Metasploitable 2 -> Kali Linux (Samba 3.x) without Metasploit

I am trying to exploit Metasploitable 2 without the use of Metasploit, with the aim of learning. In this case, I am focusing on Samba 3.x (Port TCP 139, 445)
In this link http://www.rwbnetsec.com/samba-3-x/ two different methods are explai… Continue reading Reverse connection Metasploitable 2 -> Kali Linux (Samba 3.x) without Metasploit

Hosted LDAP Solution

The Lightweight Directory Access Protocol, otherwise known as LDAP, is a foundational protocol used to authenticate user access to IT resources. It has inspired on-prem identity management solutions like OpenLDAP™…
The post Hosted LDAP Solution… Continue reading Hosted LDAP Solution

Whiteboard Video: How LDAP-as-a-Service Works

JumpCloud’s Directory-as-a-Service® has a multitude of features, so sometimes it can be confusing to understand exactly how any one area of the product works. In order to help address this…
The post Whiteboard Video: How LDAP-as-a-Service … Continue reading Whiteboard Video: How LDAP-as-a-Service Works

Whiteboard Video: Office 365® Integration

  Looking to gain a clearer understanding of how Office 365® integrates with Directory-as-a-Service®? Greg Keller, JumpCloud’s CPO, has spearheaded a video series where he gives viewers a deep dive…
The post Whiteboard Video: Off… Continue reading Whiteboard Video: Office 365® Integration