Search Results | Authentication, access control
PREV 1   2   3   4   5   6   7   8   9   10...   15...20 NEXT
Sort by:  Most Relevant  |  Date
two-factor authentication (2FA)

Blog  Two-factor authentication (2FA) is a security process in which the user provides two authentication factors to verify they are who they say they are. 2FA can be contrasted with single-factor authentication (SFA), a security process in which the user provides only one factor -- typically a password. ...

Last updated: Jan 6, 2017   11:16 PM GMT  |  Blog: Word of the Day: Tech Definitions from WhatIs.com   |      2FA, Authentication
Pushing RD Gateway Authentication to a 3rd Party

Answer  I have a hosted platform where our thick client applications run on Windows Server 2012 R2 servers, so customers can access these by logging into the RDWeb portal. They open the application, and everything looks like it is running on their machine, when it is obviously running on the server. To acce...

Last updated: Jul 25, 2018   4:14 PM GMT   |    , Active Directory, Authentication
File System ACLs - Get-Acl #1 - Retrieving permissions

Blog  Following on from the recent set of posts about setting security permissions on shares I thought it about time I looked at the file system security permissions. PowerShell supplies 2 cmdlets, in the core engine, Get-Acl and Set-Acl for workign with permissions. These two cmdlets are part of the Micr...

Last updated: May 25, 2014   11:58 AM GMT  |  Blog: PowerShell for Windows Admins   |      NTFS permissions
Biometric Technology - Part III

Blog  Through the identification or authentication process, decisions are made regarding access. Typically, biometric identification supports physical access controls, while biometric authentication supports logical access controls. With reliance on biometrics for asset protection, security managers must ...

Last updated: Jul 16, 2009   8:31 PM GMT  |  Blog: IT Governance, Risk, and Compliance
IIS Admin

Answer  We have a backup Domain controller running server 2003. Each time I try to access the website, I get an error message : "you are not authorized to view this page". I went to the directory security tab on the website properties on IIS and checked "enable anonymous access". I then unchecked every othe...

Last updated: Apr 8, 2008   7:04 AM GMT   |    Domain Controller, IIS, Microsoft Windows Server 2003
VPN won't authenticate

Answer  Hi, We have an Windows Server 2003 R2 Standard Edition SP 1 - Small Business Edition Domain Controller and a Windows Server 2003 R2 Standard Edition SP 1 ISA Server 2006. We have VPN setup in ISA and the administrator user has no problems connecting. With any other user we are denied access. Tem...

Last updated: Sep 4, 2008   6:20 PM GMT   |    Active Directory, AD, Domain Controller
Active Directory in the Cloud

Answer  Is it possible to setup active directory in a cloud server and have users authenticate from there? I want to distribute ReadyNas devices to my office locations to have access to the Egnyte Local Cloud through AD authentication. I don't want to expose my corporate domain controller to the internet.

Last updated: Jan 12, 2012   5:15 AM GMT   |    Active Directory
AAA Network Security

Answer  Is the use of a AAA Server limited to TACASC+, RADIUS, or Diameter, or is the functionality of AAA met by the seperation of the processes used in AAA (Authentication, Authorization, and Auditing). Example: For remote access to the company network, remote users will access through a SSL VPN, req...

Last updated: Jul 23, 2010   5:20 PM GMT   |    AAA server, Active Directory, LDAP
setting up cisco ACS SE

Answer  Dear All, I'm trying to install an ACS Solution Engine in My network for access control (AAA). I succeed in setting up authentication using the internal database and that works. now My boss want users to be authenticated through an external database (windows AD). I tried achieving this but kept get...

Last updated: Feb 2, 2010   12:10 AM GMT   |    Access Control Server, Cisco, cisco ACS
IIS Authentication Blues

Answer  I recently installed SharePoint Server 2007. My first time. Initially I had no problems using the full SharePoint Central Administration site. The problems began when I set up the portal page; the initial collection site. I couldn't get access to the portal page. I remote desktop into the Serve...

Last updated: Oct 17, 2008   1:25 PM GMT   |    IIS, Microsoft Windows Server 2003, SharePoint 2007
Windows 2008 SSTP VPN trouble

Answer  Hi all, I've the following scenario: 1 Domain controller Windows 2003 Server R2 1 "VPN" Server Windows 2008 SP2 I've Certification Authority on my DC, by now this CA provides authentication for the Outlook Web Access (form based authentication) and for the ActiveSync for some PDAs. I want to dep...

Last updated: Dec 14, 2009   4:11 PM GMT   |    ActiveSync, Domain Controller, Mobile
How to Creat Authentication on DAP D-Link 3520 WIFI to Prompt for a Username and Password

Answer  Hi everyone out thereI got an issue that i would gently love to share with you and have your thought and help.Im having on my Wired network couple od DAP D-Link 3520 Access Points (But no controller) to provide a wireless connectivity.I have simply configured only to ask for a password during authen...

Last updated: Jan 5, 2014   4:22 PM GMT   |    Wi-Fi
Local clients loose connection to local SQL Server when system network drops connection to HQ.

Answer  When line to primary Domain controller is dropped, some of the current logged on clients are dropped by SQL when they try to access the database. For some clients, the application still works just fine. The clients are all set up and authenticated in the local Domain Controller. It is my thought t...

Last updated: Mar 18, 2010   9:14 PM GMT   |    Active Directory, SQL Server 2005, SQL Server 2005 connectivity
Okta: what is 'contextual' access management?

Blog  Okta's technology is used by developers to put a pre-architected layer of authentication into software applications used on traditional desktop, web or mobile environments. As a result of the above statement, we generally don't refer to Okta as a 'security company' - rather, we refer to it as an 'e...

Last updated: May 23, 2018   1:50 PM GMT  |  Blog: CW Developer Network
Citrix XenApp may seem complex, but streamlines security management

Blog  Editors Note: Eric Ogren, a frequent contributor to SearchSecurity.com, is guest blogging today. Ogren is founder and principal analyst of the Ogren Group, which provides industry analyst services for vendors focusing on virtualization and security. He can be reached by sending an email to eric@o...

Last updated: Apr 17, 2009   2:56 PM GMT  |  Blog: Security Bytes
eap-tls failing with domain certificates and 1200 APs

Answer  Using WPA TKIP with windows domain controller as certificate server. The IAS server is also a domain controller. Native 2003 domain configured to give out certificates automatically. This worked in my lab environment using a single 2003 box built to do all server functions. Cisco debug shows "serve...

Last updated: May 17, 2007   5:51 PM GMT   |    Active Directory, Wireless
Biometric Technology - Part II

Blog  Most information security practitioners accept biometrics as the science employing distinctive human attributes to discern access right validity. Specifically, imparting the Information Systems Audit and Control Association's definition, biometrics is the process for identifying or authenticating a ...

Last updated: Jul 13, 2009   6:25 PM GMT  |  Blog: IT Governance, Risk, and Compliance
WPA with EAP-TLS not working with IAS

Answer  Using win2003 domain controller with IAS to authenticate wireless users. Certificate server configured to hand out workstation and user certificates automatically. AP is cisco 1200. Got nowhere until I manually added a certificate under current user/personal/certificates. Then got this error from ...

Last updated: May 1, 2007   3:53 PM GMT   |    Active Directory, Software, Wireless
Security risks with AWS machine learning

Answer  I am interested in the key security risks associated with AWS Machine Learning. IT Domains specific to which I seek information are listed below: Access Control and User Authentication System / Product Security Application Development Network and Infrastructure Security Internet Facing Ap...

Last updated: Aug 2, 2016   10:01 AM GMT   |    AWS, Machine learning, Security
Cisco WLC with PEAP authentication on a MS Radius server

Blog  Just set up 802.1x authentication on a Cisco Wireless LAN controller WLAN for the first time. My objective is to get Active Directory authentication working for my WLAN, accessible by both corporate laptops as well as blackberry and iphones. I set up my WLAN with 802.1x auth pointing to a radius se...

Last updated: Jun 30, 2011   7:49 PM GMT  |  Blog: The ranting of an IT Professional
PREV 1   2   3   4   5   6   7   8   9   10...   15...20 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: