Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • LDAP Authentication with Azure AD

    LDAP (Lightweight Directory Access Protocol) authentication can confirm user identities across a network. It uses a centralized directory system for user authorization and authentication. On the other hand, Microsoft offers a cloud-based identity and access management solution called Azure Active ...

    Read More
  • A Guide to Server Certificates

    Server security is critical in today’s digitally driven environment. The server certificate, a digital document that verifies the identification of a website or server, is fundamental to Internet communication security. Server certificates enable encrypted connections, guaranteeing the confidentiality and integrity ...

    Read More
  • What is a Jamf Push Certificate?

    Do you use Apple devices in your work infrastructure? Then you’ve probably heard of Jamf. Jamf Pro is one of the most robust and feature-dense solutions for managing Apple devices. To fully take advantage of Jamf Pro, you will need ...

    Read More
  • Risk of Public Wi-Fi

    Public Wi-Fi is any network other than your home or work network and is commonly found in places such as airports, malls, coffee shops, hotels, and restaurants. It allows users to connect to an unknown network for free. People extensively ...

    Read More
  • Configure Azure AD Continuous Access Evaluation for RADIUS

    Continuous Access Evaluation (CAE) is an essential security feature in Azure Active Directory (Azure AD) that constantly monitors and evaluates user access to resources. Through CAE, Azure provides a proactive approach to maintaining a secure environment and safeguarding sensitive data ...

    Read More
  • How Does SSH Certificate Authentication Work?

    Secure Shell (SSH) certificate authentication provides a robust method for authenticating users and hosts connecting to an SSH server. As a protocol, SSH prevents unauthorized parties from accessing systems remotely. But how does SSH implementation look in an organization environment? ...

    Read More
  • Understanding Phishing-Resistant MFA in Azure AD

    On an average day, most employees have to log into numerous different applications and resources at work. The influx of applications necessary for work has led to an exponential increase in login and authentication methods, including things such as one-time ...

    Read More
  • How to Configure Kandji SCEP Profile

    Digital certificates have, time and again, proven to be more secure than credential or password-based authentication as they are phishing-resistant. However, manually distributing digital certificates is a considerable challenge for network administrators in larger organizations. Simple Certificate Enrollment Protocol (SCEP) ...

    Read More
  • Configuring Azure AD CBA with Conditional Access Policies

    Conditional Access Policies, the If-Then statements available in Microsoft Azure AD (Entra ID), enable a much more granular level of access control over the resources managed with Azure AD / Entra ID. It can be used to assess a user’s ...

    Read More
  • A Comprehensive Review of Certificate Pinning: The Challenges and Alternatives

    While digital certificates undoubtedly provide a more secure authentication method than passwords, some organizations still fear the possibility that certificates can be issued to unauthorized parties. Certificate pinning is a security strategy designed to prevent this from occurring by creating ...

    Read More