by Christopher Perry 0 Comments

Sharepoint Password Expiration Example: Poor UI

 

SharePoint password expiration: that alone is often enough to make chills run down the back of a typical IT administrator. Regardless of the environment, SharePoint remains a popular choice for many organizations. Reasons vary, of course, but the fact remains that SharePoint shows up just about everywhere, even today. That’s not to say that everything with SharePoint is perfect: simply do a...

Continue Reading →

Tags: Authentication Methods, Identity Provider, User Experience, password expiration, Password Management, #SharePoint, User Authentication

by Christopher Perry 0 Comments

Prophecy Vs. Reality: Popular Cybersecurity Trends of 2019

Society loves prophecy.  Whether it’s used as a justification for acts of good or evil, or even if it’s just a matter of looking at your friend and saying “HA!  I was right!”  Correctly predicting what’s coming is a safe bet in terms of drawing interest, and it is a small wonder that even the biggest tech giants have hopped on that bandwagon.  Of course, prophecy and reality often differ, and...

Continue Reading →

Tags: 2FA, Authentication, authentication management, Authentication Security, authentication security, cloud, Cloud SaaS, cloud security, #cybersecurity, encryption, Gartner, Identity Provider, MFA, Multi-Factor Authentication, #passwords, #ssoimplementations, trust, Authentication Provider, Cloud authenticaiton, Cloud Authentication, data breach, data security, password encryption, two-factor, Two-Factor Authentication, #twofactor, security trends, password habits, secure acounts, password-based authentication, passwordless, Keeping your information safe, NIST, contextual Two-Factor Authentication, usual password, Google, identity solutions, open-source software, haveibeenpwned.com, two-step authentication, two-step verification, real-time monitoring

Your Online Security is Important - Better Your Digital Profile

Strong online security is the white whale of the digital revolution.  With each step towards the final achievement, development and ingenuity necessitate that the individual takes two steps back.  One step to familiarize oneself with the new technology, and another to determine the best foot forward. It’s an inescapable fact that technology moves faster than most people. 

Rapid evolution isn’t...

Continue Reading →

Tags: 2FA, #applications, authentication security, Identity Provider, MFA, Multi-Factor Authentication, multilayer authentication, technology, usability, data breach, data security, Password Security, Two-Factor Authentication, data quality, security risk, PortalGuard Security Policy, google titan security key, mobile authenticator, trending cybersecurity attacks, information systems, maintain security privacy, maintain data privacy, improve usability and productivity, development server, Admin Privileges, multilayer encryption, strong online security, technology evolution, digital profile, online security, improve security, phone call, second factor

by Jay Ouellette 0 Comments
by Gregg Browinski 0 Comments

Universal Logout - Where to Go After SSO

Universal logout is a hot topic today for one simple reason: it is important. Single Sign-On (SSO) has taken over in recent years as a method of reducing login strain and improving security while maintaining usability.  In an age of passwords and data breaches, SSO has always been seen as the next logical step. Now that we’ve taken that step, the question becomes: where do we go from here? The...

Continue Reading →

Tags: Identity Provider, SSO, Single-Factor Authentication, Single Sign-On (SSO), Two-Factor Authentication, web applications, Custom Branding, SSO Proxy, Jump Page, universal logout, SAML SLO, SAML Single Logout, cookies, secure login

SharePoint Password Expiration - An Example of Poor UI

SharePoint password expiration: that alone is often enough to make chills run down the back of a typical IT administrator.  Regardless of the environment, SharePoint remains a popular choice for many organizations. Reasons vary, of course, but the fact remains that SharePoint shows up just about everywhere, even today. That’s not to say that everything with SharePoint is perfect: simply do a...

Continue Reading →

Tags: Authentication Methods, Identity Provider, User Experience, password expiration, Password Management, #SharePoint, User Authentication

by Tom Hoey 0 Comments

SAML Overview

What is SAML?

The SAML specification is an XML-based framework designed for transporting user authentication, entitlement, and attribute information across the web safely and efficiently.  It has a number of primary usage scenarios, including but not limited to the following:

Continue Reading →

Tags: Assertion, Authentication, Authentication Security, Identity Assertion, Identity Federation, Identity Provider, IdP, IdP initiated, OASIS, PortalGuard, SAML Token, XML, Access Control, Principal, SAML, SAML Request, SAML Response, Service Provider, Single Sign-On, SOAP, SP Initiated

by Tom Hoey 0 Comments

SAML Single Sign-On for BlackBoard

Sensitive data makes universities a large target for attacks as we have seen in recent news. Increasing both security and providing ease of use for both faculty and students is imperative. PortalGuard’s SAML Plug-in for BlackBoard uses a standards-based approach so you can achieve seamless integration, eliminate multiple password prompts and roll all applications up under a single point of...

Continue Reading →

Tags: ACS, Assertion Consumer Service, Authentication Security, Blackboard, Blackboard Extension, Building Block, Identity Provider, IdP, PortalGuard, Security Assertion Markup Language, SSO, Tokenless Authentication, Authentication Provider, SAML, Service Provider, Single Sign-On, Single Sign-On (SSO), Two-Factor Authentication