Zero Trust M&A Strategy: Adaptive Authentication


Those of us in IT understand the complexities with integrating two separate IT environments into one because of a merger/acquisition. How can we provide access to apps from another company with a zero trust network access (ZTNA) strategy?  This was something recently detailed in the following items Reference Architecture: Zero Trust Mergers & Acquisitions StrategyUser… Continue reading Zero Trust M&A Strategy: Adaptive Authentication

Authentication: Push


One of my goals before the end of the year is to protect my online accounts with multi-factor authentication. I’ve been protecting many of my identities with TOTP. TOTP is a great way to add multi-factor authentication to our identity.  It adds the “something I have” to the “something I know”. However, I’m now running… Continue reading Authentication: Push

Citrix Workspace Authentication: Overview


One of the major issues with the current state of the end user computing environment is the number of identities a user is required to remember.  Almost every service or application a user subscribes to requires the user create a new identity and password. With so many identities, almost all of us use the same… Continue reading Citrix Workspace Authentication: Overview

Citrix Workspace Authentication: Citrix Gateway


One of the challenges with using cloud services is getting the same experience you had in an on-premises deployment. For the past 20+ years, many Citrix Virtual Apps and Desktop deployments utilized a Citrix Gateway to provide an ICA proxy through the firewall. For external users, Gateway also authenticated those users. Over the years, admins… Continue reading Citrix Workspace Authentication: Citrix Gateway

Authentication: Two-Step Verification


So far, I’ve realized the following I have way too many identities Password complexity rules are implemented incorrectly Multi-factor authentication will provide additional authentication security So let’s look at one of the most basic forms of MFA. Unfortunately, I’ve seen this take on many names: Two-Step Verification Two-Step Authentication One-Time Password After providing your username… Continue reading Authentication: Two-Step Verification

Authentication: Your Identity


Most of us ignore authentication because it is seamless with us using our Active Directory username to log onto a domain-joined Windows 10 PC. But when we expand beyond Windows, there are so many other things to consider. I avoided learning about authentication for a long time.  So many technologies. So many acronyms.  So many… Continue reading Authentication: Your Identity