Abhiramcloudbuddy.hashnode.dev·Dec 12, 2024Balancing Security and Agility: A Deep Dive into CIEMCloud Infrastructure Entitlement Management (CIEM) has emerged as a critical tool for organizations to manage access to cloud resources effectively. By automating and streamlining access control processes, CIEM helps organizations balance security an...cloud security
Web3 Learning Orbweb3learningorb.hashnode.dev·Dec 5, 2024Web3 and Identity ManagementIntroduction In September of 2017, a massive data breach at Equifax exposed the personal data of over 147 million people. The breach was a wake-up call for many of us, highlighting the risks and vulnerabilities of our digital identities. But it also ...8 likesWeb3
Gusgsalazar.hashnode.dev·Dec 4, 2024Centralización de Usuarios y Autenticación con IDP Open SourceIntroducción La gestión centralizada de usuarios y permisos es esencial en sistemas modernos, especialmente para empresas que manejan tanto clientes como personal interno (staff). Un Proveedor de Identidad (IdP, por sus siglas en inglés) con soporte ...31 readsSecurity
Ugo Umeokeeurocode.hashnode.dev·Nov 29, 2024Quick Guide to Identity Endpoints in .NET 8+Identity management is a critical aspect of modern web applications, providing the infrastructure necessary for managing users, roles, authentication, and authorization. With .NET 8, Microsoft has further streamlined the process by introducing enhanc...C#
Christopher Ortiz Aldanacortizaldana.hashnode.dev·Oct 21, 2024Project Stellar AccessWelcome to Project Stellar Access! In this project we will get familiar with how DHCP, DNS, and FreeIPA works. The following configurations will be done on a Rocky Linux 9.4 machine. DHCP server (192.168.1.2) BIND9 server (192.168.1.3) FreeIPA ser...Open Source
Shruti RajeshforZySec AIblog.zysec.ai·Oct 15, 2024AI-Powered Identity Verification and the Battle Against Deepfakes: A Digital ShowdownImagine waking up, grabbing your favorite mug, and finding out that deepfake technology has decided to impersonate you so convincingly it even fooled your coffee machine. Welcome to October 2024, where the digital wild west is at it again, and AI is ...news
Olívio Mouracoisasdatreta.hashnode.dev·Oct 3, 2024Powershell - Add users from groups to assign group with group exceptions# Ensure the Microsoft.Graph module is imported # Import-Module Microsoft.Graph # Authenticate using the managed identity Connect-MgGraph -Identity -NoWelcome #Connect-MgGraph -Scopes "User.Read.All", "Group.ReadWrite.All" -NoWelcome # Control vari...Powershell
SUJIT KUMAR SAHOOsujittulu.hashnode.dev·Sep 28, 2024What and Why Active Directory?Active Directory (AD) is a Microsoft directory service that helps organize and manage users, devices, and network resources in Windows domain networks. Why we should user Active Directory? Authentication and authorization AD checks users' credent...Active Directory
Tanishka Marrottcloud-design-diaries.hashnode.dev·Sep 26, 2024Why AWS Organization-Wide Backup Policies Are Essential for Your Cloud StrategyWhen it comes to managing backups in a dynamic, cloud-based enterprise, AWS Organization-wide Backup Policies offer a scalable and cost-effective solution to ensure data redundancy, business continuity, and compliance. As enterprises grow and diversi...1 likeData Science
Vamsi Krishna Sethuvamsi344.hashnode.dev·Sep 25, 2024Integrating Keystone and Keycloak: A Guide to OpenStack FederationIdentity federation is the ability to share identity information across multiple identity management systems. In keystone, this is implemented as an authentication method that allows users to authenticate directly with another identity source and the...48 readsmellon