Zero Trust M&A Strategy: Adaptive Authentication


Those of us in IT understand the complexities with integrating two separate IT environments into one because of a merger/acquisition. How can we provide access to apps from another company with a zero trust network access (ZTNA) strategy?  This was something recently detailed in the following items Reference Architecture: Zero Trust Mergers & Acquisitions StrategyUser… Continue reading Zero Trust M&A Strategy: Adaptive Authentication

A Intro to SAML


A secret handshake or an inside joke. Fun ways for us to share information to each other, secretly. Without the historical association, others will fail to get access or understand the full meaning. Welcome to SAML SAML is a way to securely share authentication and authorization information between two parties. Most often, SAML is used… Continue reading A Intro to SAML

Authentication: Your Identity


Most of us ignore authentication because it is seamless with us using our Active Directory username to log onto a domain-joined Windows 10 PC. But when we expand beyond Windows, there are so many other things to consider. I avoided learning about authentication for a long time.  So many technologies. So many acronyms.  So many… Continue reading Authentication: Your Identity