101 Uses for a Virtual Directory

White Paper 101 Uses for a Virtual Directory

Your corporate directory services and individual application identity pools are fragmented and sprawled throughout your enterprise. What if there were a way to ‘join’ all of these directory services, virtually, into a single view, without consolidation, without creating another database or pushing and pulling directory identity data back and forth across the network in a never-ending process of synchronization.

buyers guide to mutlifactor authentication whitepaper

White Paper Buyer’s Guide to Multi-Factor Authentication (MFA)

MFA is the norm in business today due to the desire for better access control and the need to comply with regulatory requirements. And while every company and every vertical have different requirements for their MFA solutions, they all should start by analyzing the same three elements: scope, usability, and means of delivery. With these elements in mind, this paper takes a tactical approach to guide you through various MFA options.

IDaaS SSO Leadership Report

White Paper KuppingerCole Leadership Compass Report

Optimal IdM Named a Leader in KuppingerCole Leadership Compass Identity
As a Service: Single Sign-On to the Cloud Report  

Video Optimal People Picker for SharePoint

Optimal People Picker Overview (8 minutes)
Provides an overview of the Optimal People Picker

video bridging the protocol gap in cloud identity services

Video Webinar: Bridging The Protocol Gap On Cloud Identity Projects

(40 minutes 50 seconds) Webinar: Bridging The Protocol Gap On Cloud Identity Projects (40 minutes 50 seconds) Bridging the divide between newer authorization and federation protocols such as OAuth2 and OpenID Connect and connecting to older federation protocols such as SAML2 and WS-Federation presents some unique challenges. We will discuss those challenges and look at some practical, real world solutions. Various web applications, thick clients, and web services will be reviewed. This technical presentation will cover: Origin of protocols and when to use them Best options to use with mobile apps How to deal with situations outside of specifications Security concerns to consider

Just a few things . . .




 

By clicking Submit, you consent for us to use your personal data for sales and marketing efforts. If this is unacceptable, please contact us via telephone.


Page 2 of 41234