July 18, 2017
Dow Jones becomes the latest organization to be affected by an AWS cloud data leakage due to misconfiguration and user error.
June 28, 2017
An IT pro at Cloud Identity Summit shares his experience implementing identity management at the University of Oklahoma and describes what pitfalls to avoid.
March 08, 2017
Identity cloud provider company Okta has snuggled up with identity management company Stormpath. Who brings what to the party? This new union is designed to bring forward Okta Identity Cloud as ...
August 31, 2016
Identity Manager provides user authentication and access control, both in the cloud and on-premises. VMware provided an overview of both models in a VMworld 2016 session.
IDaaS Get Started
Bring yourself up to speed with our introductory content
Our environment has multiple AWS accounts for different dev stages. How can we use the IAM cross-account feature to share resources across accounts? Continue Reading
By controlling who sees what, identity and access management tools give a business a much better hand to play in the always tricky cloud security game. Continue Reading
Amazon Cognito is an Amazon Web Services (AWS) product that controls user authentication and access for mobile applications on internet-connected devices. The service helps to speed application development by saving and synchronizing end user data, freeing up time for the developer. Continue Reading
Evaluate IDaaS Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
These days, hackers hide behind every corner and wait for an open door. Employ continuous security monitoring and testing for all cloud models, including serverless computing. Continue Reading
IT policies must explicitly establish the identity of users and their rights to access resources. Otherwise, an organization will not meet the requirements of cloud computing. Continue Reading
The best SSO today can handle the apps mobile workers use, identity as a service and more. Learn to make single sign-on, and other identity management approaches, more effective. Continue Reading
Learn to apply best practices and optimize your operations.
Enterprises operate multiple AWS accounts for a variety of reasons. That approach, however, creates management woes. AWS Organizations automates and simplifies the process. Continue Reading
Cloud security has been a major roadblock to adoption, but a phalanx of tools allows enterprises to customize an AWS security strategy for each situation. Continue Reading
The AWS free tier of service holds real value for tire kickers, giving them a head start in the AWS cloud, albeit with some limited tooling. Continue Reading
Problem Solve IDaaS Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
CASBs have started extending their reach into IaaS platforms. Expert Rob Shapland looks at what they're doing and the effect they could have on IaaS security. Continue Reading
Using Amazon Cognito in conjunction with an "authenticate" function in AWS Lambda can help secure vulnerable back-end information and infrastructure. Continue Reading
While using the cloud for identity and access management can simplify the task, it is critical to consider a number of factors when implementing cloud IAM products and services. Expert Dave Shackleford explains. Continue Reading