SSH Keys and Challenges in Enterprise Environments
This article got published in 2600 Volume Thirty-Five Number One! / Spring 2018 The Secure Shell protocol was invented in 1995 to overcome the lack of strong, encrypted authentication of remote tools like telnet, rlogin, rsh and similar protocols. Security improvements have been implemented in version 2, which was released in 2006. More detailed information […]
Windows 10 – VPN Shortcut
When you need a quick way to connect to a VPN in Windows 10, I suggest using a desktop shortcut, or a quick launch bar one (or both, as you like). To create the shortcut, click on any empty space on your desktop, go to New -> Shortcut, as target choose rasphone -d “ConnectionName” If […]
Identity Management and Its Role in Security Strategy of Enterprise Environments
This article has been printed in 2600 Volume Thirty, Number Three Enterprise environments are usually anything but homogeneous. So IT folks get confronted with many different operating systems, often many of them are not using the same user and group databases or any compatible processes for configuring for access control. This is a reason why […]
Identity Management und generische Benutzerkonten
Im klassischen Identity Management werden Identitäten betrachtet, sprich reale Personen, ihre Zugriffsrechte, Aufgabenbereiche, erforderliche Arbeitsmittel, etc. Im Idealfall werden bei einem Abteilungs- oder Projekt-wechsel die Berechtigungen angepasst, sprich nicht nur erforderliche Rechte erteilt, sondern auch nicht erforderliche wieder gelöscht. Das zentrale Verzeichnis, heute oftmals Microsoft Active Directory® ist generell so gut angebunden und verwaltet, dass […]