Identity 101 Index
Authentication
- Multi-factor Authentication + VPN = Secure and Private
- Why Multi-Factor Authentication is Everywhere
- What is Strong Authentication? We Rank 6 Security Factors
- Should You Choose U2F or Adaptive MFA?
- Which Industries Require Two-Factor Authentication?
- Authentication vs Authorization
- What Is a Security Token (or Authentication Token) and How Does It Work?
- What to Look for in a Risk-Based Authentication Solution
- What is the Most Secure Authentication Method for Your Organization?
- Biometrics: Secure Authentication in the Modern Age
- What’s the Difference Between OAuth, OpenID Connect, and SAML?
- Take Your Security to the Next Level with Context-Based Authentication
- What Is Token-Based Authentication and Who Uses It?
- SAML vs. OAuth: Comparison and Differences
- Universal 2nd Factor (U2F): History, Evolution, Advantages
AD/Active Directory
- Tips to Better Leverage Your Active Directory
- Single Sign-On: The Difference Between ADFS vs. LDAP
- How Okta Helps Automate User Provisioning for Active Directory
- LDAP vs. Active Directory: What's the Difference
Customer Identity and Access Management (CIAM)
Digital Transformation
- How Legacy Apps Are Moving to the Cloud: Office 365
- What Is Hybrid Cloud Architecture and How Can We Use It?
- What Is Cloud Native Architecture: A Guide
- Arriving at a Hybrid IT Definition
- How To Plan a Successful Cloud Migration Strategy
Identity and Access Management (IAM)
- User Access Management Basics
- An Overview of Identity and Access Management (IAM)
- What is IDaaS? Understanding Identity as a Service and Its Applications
- Privacy, Security, Efficiency: The Benefits of a Cloud Identity Provider
- Setting Up IAM: Managing Permissions to Ensure Compliance
- How Identity and Access Management Quietly Powers Your Company
- How to Start Investing in Identity and Access Management
- What Is Identity Management and Access Control?
- The Importance of Centralized Identity Management
- The Changing Landscape of Enterprise Identity Management
- 4 Key Things You Should Know About Access Governance
- Identity Governance: What It Is & Why Your Business Needs It
IT Management
- What is a Network Access Server?
- Why Your Company Needs an Identity Provider
- How Identity Governance Protects Your Business
- ICMP Protocol (Internet Control Message Protocol): A Guide
- HMAC (Hash-Based Message Authentication Codes) Definition
- IDS vs. IPS: Definitions, Comparisons & Why You Need Both
- HTTP Error 431: Definition, Status, Causes & Solutions
Lifecycle Management
- Scale Securely: Establishing Universal Directory Policies
- Understanding Lifecycle Management and Regulatory Compliance
- Managing the User Lifecycle: Device Provisioning Made Easy
- What Is Role-Based Access Control (RBAC)?
- Role-Based Access Control vs Attribute Based Access Control
Single Sign-on (SSO)
- What to Look for When Choosing a Single Sign-On Solution
- How to Choose Your SSO Strategy
- Build a Strategy for Password Management
- Federated Identity Management vs. Single Sign-On: What’s the Difference?
- What Is Federated Identity?
Security
- 3 Common Mistakes That Lead to a Security Breach
- Building Zero Trust Networks: Securing the Perimeter
- How to Set Up Privileged Access Management
- What Is Corporate Account Takeover and How Do We Prevent It?
- Why Is Cloud Security So Important?
- Reducing Your Attack Surface: A Guide
- What Is Least Privilege Access—and Why Do You Need It?
- What is an Attack Surface? (And How to Reduce It)
- Scareware: Definition, Identification & Prevention
- What Is a VPN & How Does It Work?
- Hashing vs. Encryption: Definitions & Differences
- What Is LDAP & How Does It Work?
- DMZ Network: What Is a DMZ & How Does It Work?
- DNS Poisoning (DNS Spoofing): Definition, Technique & Defense
- Asymmetric Encryption: Definition, Architecture, Usage
- ARP Poisoning: Definition, Techniques, Defense & Prevention
- Credential Stuffing: Definition, Techniques & Defense