Category: <span>technology</span>

Enabling and Securing Zoom meetings

Introduction to Zoombombing It’s difficult to underestimate the effect that the current COVID-19 pandemic has on our way of life.   The need to work in isolation to prevent the spread of the virus while remaining connected to the people in our lives is a challenge.  Creating the right environment to support remote workers has
Read More

Supporting our Customers Through COVID-19

The IDMWORKS family is closely monitoring all developments related to COVID-19 both here and abroad. We are taking every measure to ensure that service and support to our customers continues to be available at the highest level without interruption. As the situation continues to escalate, we understand that healthcare providers, financial institutions, colleges, universities, and
Read More

Centralized Authentication in Linux, SSSD, and a Simple(r) Approach to sudoer management in Linux: Part 3

In part 1 of this blog series, we talked about centralized authentication in Linux and covered some basic use cases. Part 2 discussed System Security Services Daemon (SSSD) and why it’s becoming so important to centralized authentication in the Linux space.  In part 3, our final post in the series, we’ll discuss authorization and different
Read More

Centralized Authentication in Linux, SSSD, and a Simple(r) Approach to sudoer management in Linux: Part 2

In part 1 of this blog series, we talked about centralized authentication in Linux and covered some basic use cases. In today’s post, we want to talk about System Security Services Daemon (SSSD) and why it’s becoming so important to centralized authentication in the Linux space. But first, we will touch upon Pluggable Authentication Module
Read More

Centralized Authentication in Linux, SSSD, and a Simple(r) Approach to sudoer management in Linux: Part 1

Linux is, without a doubt, one of the most used server operating systems in the world. It is flexible, powerful, and many times the solutions derived from Linux-based applications are as good as their commercial, and proprietary, counterparts. Linux does have challenges that start from the very moment a user of the host attempts to
Read More

FIDO2 for a Better User Experience

Shortly after buying some new couches for their home, my neighbors got saddled with dog-sitting duty by a relative.  In an effort to protect their investment from the scratches and claw marks of the 50-pound Belgian Shepard that sent their previous sofa set to the furniture graveyard, they started online shopping for furniture covers.  They
Read More