Use el acceso condicional para mejorar la postura de seguridad de su fuerza de trabajo remota

Ya que el trabajo remoto se está convirtiendo en la norma, las políticas tradicionales para el control del acceso que rigen cómo se otorga el acceso y bajo qué circunstancias, tienen una necesidad de una renovación inevitable.
Implementar políticas de… Continue reading Use el acceso condicional para mejorar la postura de seguridad de su fuerza de trabajo remota

Imagining a professional life without passwords

Passwords are a source of many security risks, with recent LastPass research revealing IT teams are spending five hours a week on average dealing with password-related issues. A passwordless login experience, on the other hand, provides employees with … Continue reading Imagining a professional life without passwords

OAuth 2.0: programmatically authenticate Resource Server user after Authorization Code grant

The requirement: have a user, existing in an IDP, be automatically authenticated on a Resource server. IDP app can then provide web view for resource server user.
OAuth 2.0 Approach:

IDP nudges resource server saying they want a user to b… Continue reading OAuth 2.0: programmatically authenticate Resource Server user after Authorization Code grant

Cookie set from a server to a client with different domain(via XHR), but not recognized by Client domain

I have three domains but the same code base (Domain X, Domain Y, Domain Z) and
Accounts website A
If a user tries to sign in accounts from domain X, I wanted to SSO in the other two domains (Browser Scenario: third party cookies blocked)…. Continue reading Cookie set from a server to a client with different domain(via XHR), but not recognized by Client domain