JANUA settled in 2004 in Sophia-Antipolis, south-east of France. JANUA specialises in IAM (security, access control, identity management) and Open Source integration. It offers high value-added consulting, integration, products and services with a concern for identity management and Open Source components.
Security vulnerabilities have been discovered in OpenAM components including the Core Server. These issues are present in versions of OpenAM including 11.0.x, 10.1.0-Xpress, 10.0.x, 9.x, and possibly previous versions. This advisory provides guidance on how to ensure your deployments can be secured. Workarounds or patches are available for all of the issues, which are also included in the 12.0.0 release. …
If you use LDAP with Keystone in Juno you can give your implementation a turbo-boost by using LDAP connection pools. Connection pooling is a simple idea. Instead of bringing up and tearing down a connection every time you talk to LDAP, you just reuse an existing one. This feature is widely used in
As organizations try to rein in technology budgets, IT staff members are constantly tasked with doing more and providing better services, all the while keeping costs and staff to a minimum. Couple this with increased usage of applications in the cloud, and the security issues entailed therein and you have a perfect combination for delays and disgruntled users.
Inspired by the work and some excellent blog articles by my colleague Maarten Smeets – and while writing about the LDAP Adapter in SOA Suite 12c for the Oracle SOA Suite 12c Handbook) I decided to give ApacheDS (LDAP Directory) a spin. This article lists the very basic steps for getting started with both theRead More
Security vulnerabilities have been discovered in the OpenAM Web Policy Agents and Java EE Policy Agents. These issues are present in versions of the Web Policy Agents up to and including version 3.3.3 and Java EE Agents 3.3.0. This advisory provides guidance on how to ensure your deployments can be secured. Fixes for the vulnerabilities are available in the latest …
Security Assertion Markup Language (SAML) is a popular XML-based open standard for exchanging authentication and authorization data between two systems. In the world of enterprise cloud applications,...
The growth of the IoT means that identity and access management leaders of digital businesses require a way of defining and managing the identities of "entities" (people, services and things) within a single framework.
Earlier today I read Accenture’s new report on the Industrial Internet of Things (IIoT). In the report Accenture states that by 2030, IIoT will add $30 Trillion to global GDP and that a major inhibitor to IIoT is outdated or non-existent access management. I fully agree that IIoT has the...
Sharing your scoops to your social media accounts is a must to distribute your curated content. Not only will it drive traffic and leads through your content, but it will help show your expertise with your followers.
How to integrate my topics' content to my website?
Integrating your curated content to your website or blog will allow you to increase your website visitors’ engagement, boost SEO and acquire new visitors. By redirecting your social media traffic to your website, Scoop.it will also help you generate more qualified traffic and leads from your curation work.
Distributing your curated content through a newsletter is a great way to nurture and engage your email subscribers will developing your traffic and visibility.
Creating engaging newsletters with your curated content is really easy.