Active Directory Certificate Services (AD CS) is a Windows server software solution designed to issue x.509 digital certificates. Certificates have proven to be more secure and easier to use than passwords, and are commonly used for Wi-Fi, VPN, and web …
What is Certificate Lifecycle Management?
What is Certificate Lifecycle Management?
November 24, 2020Using X.509 digital certificates for authentication is an immediate and significant upgrade to credential (password) authentication, but it requires proper support infrastructure. Certificate Lifecycle Management systems (CLM/CLMS), also called Certificate Management Systems (CMS), provide that support. They allow admins to …
Managed PKI Solutions for Active Directory Certificate Services
Managed PKI Solutions for Active Directory Certificate Services
November 20, 2020Investing in a Public Key Infrastructure (PKI) for your 802.1x network is the single best decision you can make to improve your network. The hardened security and improved user experience provided by X.509 digital certificates is the obvious next step …
Yubikey PIV Certificate Slot Configuration
Yubikey PIV Certificate Slot Configuration
October 19, 2020What are Certificate Slots? Physical security tokens like the Yubikey have smartcards that can be configured to store a number of certificates, the quantity of which depends on the specifications of the secure cryptoprocessor that is the heart of the …
Okta Certificate Authentication With SSO
Okta Certificate Authentication With SSO
September 15, 2020A major issue that organizations face for authentication is managing a host of different credentials for various different web applications. Traditionally, web app authentication requires a unique and complex set of credentials to ensure only those with approved access can …
LDAP Authentication With Okta
LDAP Authentication With Okta
September 9, 2020For many years, LDAP has been the dominant protocol for secure user authentication for on-premise directories. Organizations have used LDAP to store and retrieve data from directory services and it is a critical part of the Active Directory (AD) ecosystem. …
How Does Public Key Encryption Work?
How Does Public Key Encryption Work?
July 23, 2020We are living in a time where wireless security is imperative because private data and personal information are uploaded online. As the amount of online data increases, so does the monetary cost of cybercrime. Cyber attacks are incredibly dangerous and …
The Four Stages of a Certificate Life Cycle
The Four Stages of a Certificate Life Cycle
July 7, 2020Digital certificates are electronic credentials that are used to authenticate the identities of individuals or devices using a particular network. It’s helpful to think of certificates with a similar functionality as a passport or driver’s license. While these official documents …
How to Automate Certificate Management and Provisioning
How to Automate Certificate Management and Provisioning
May 15, 2020One of the biggest hurdles in certificate management is the lack of experience around finding the proper certificate management solutions. Often, administrators are of the notion that their only options for certificate management are pricey PKIs exclusive for enterprise, that …
How to Generate Root & Intermediate CAs
How to Generate Root & Intermediate CAs
May 5, 2020A proper PKI allows your network to utilize certificate-based authentication. Root CAs and Intermediate CAs are both parts of the SSL chain that make these certificate-based networks effective. This article will explain why they’re important, the difference between the two, …
- Page 1 of 2
- 1
- 2