Home/Jason Gordon

About Jason Gordon

This author has not yet filled in any details.
So far Jason Gordon has created 10 blog entries.

Implementing CAC smart card authentication for Web Sites

By |2016-10-13T14:30:45-04:00November 5th, 2015|IDM360, Multi-Factor Authentication|

Implementing CAC smart card authentication for Web Sites This blog discusses how to enable web sites to support access via the Department of Defense Common Access Card (CAC). What is a CAC? The Common Access Card  is a secure identification card issued to Department of Defense (DOD) personnel and civilian contractors.  It is a [...]

Active Directory for Customer Records

By |2016-10-13T14:30:51-04:00October 28th, 2015|IDM360|

Active Directory for Customer Records Microsoft Active Directory is one of the most popular Identity management systems for storing employee records.  It is a required component for any organization that uses Microsoft Windows domains and thus is ubiquitous in Microsoft shops. Typical information stored about employees include name, department number, user id, password, group [...]

Implementing Corporate Single Sign-on

By |2016-10-13T14:30:59-04:00October 23rd, 2015|Corporate Single Sign-On, IDM360|

Implementing Corporate Single Sign-on From my previous blog we saw that implementing Corporate SSO is one of the most cost effective ways to enable cloud-based employee services and tools. Integration to each cloud services has a small to medium start up effort but then immediately starts paying benefits in terms of reduced cost of [...]

The case for Corporate Single Sign-on

By |2019-09-26T14:40:20-04:00October 19th, 2015|Corporate Single Sign-On, IDM360|

The Case for Corporate Single Sign-On Corporate single sign-on (SSO), allowing employees connect to all internal and external system with a single user id and passwords has long been a goal of IT managers. They traditionally, site the effort of maintaining multiple userids/passwords, the time spent performing password change and reset and the resultant [...]

What is Corporate Single Sign-on?

By |2019-09-26T14:38:04-04:00October 18th, 2015|Corporate Single Sign-On, IDM360|

What is Corporate Single Sign-On? Corporate Single sign-on (SSO) is the process of allowing an organizations employees to access a wide variety of company services without needing to maintain and enter separate user-ids and passwords for each site.  The types of services that employees might use include everything from time-card entry to travel management, [...]

Integrating Two-Factor Authentication into Legacy Web Applications

By |2016-10-13T14:31:13-04:00August 11th, 2015|IDM360|

Integrating MFA into Legacy Web Sites Two factor or multi-factor authentication is fast becoming a requirement for secure web applications. Simply offering a userid/password screen is no longer considered secure for many critical applications protecting sensitive data. Companies and organizations that wish to protect customer-facing web sites with two-factor authentication face extra challenges including: [...]

Comments Off on Integrating Two-Factor Authentication into Legacy Web Applications

Why is Identity Management so difficult

By |2016-10-13T14:31:19-04:00April 14th, 2014|IDM360|

Unified/centralized Identity Management is the goal of many if not most organizations.  Let's consolidate our numerous separate directories and applications under a common, centralized and federated directory to simplify user and rights management.  A large industry has emerged to assist with this task with sophisticated (read expensive) tools.  Yet, after initial, painful forays into consolidating [...]

Comments Off on Why is Identity Management so difficult

Enterprise IT Challenges for Terminated Employees

By |2016-10-13T14:31:21-04:00June 22nd, 2013|IDM360|

Companies are facing increased pressure to remove employees that have left the company from all computer systems where they may have access to sensitive data. These pressures are coming from a number of sources.  Regulations like the MA201 privacy act and HIPPA are creating strict controls around the protection of customer personal data.  Increasingly, companies [...]

Comments Off on Enterprise IT Challenges for Terminated Employees

OAuth and SAML: Mobile meets enterprise

By |2016-10-13T14:31:23-04:00May 13th, 2013|IDM360|

OAuth and SAML: Mobile meets enterprise OAuth has become the de-facto standard for mobile application authentication.  SAML is the single sign-on mechanism of choice for enterprise web applications.  Why would you need both?  Imagine this common scenario.  You are deploying a cool new mobile application on a Mobile App Server in the cloud. Some [...]

Comments Off on OAuth and SAML: Mobile meets enterprise

Is OAuth a good protocol for Single Sign-on?

By |2016-10-13T14:31:26-04:00May 13th, 2013|IDM360|

I've seen a number of posts stating that Open Authorization (OAuth) is not a good/safe/efficient protocol for Single Sign-on (SSO). The main argument is that OAuth is intended for authorization (asking permission to use a resource) rather than authentication (confirming a user is who they say they are). The reality is that before you can [...]

Comments Off on Is OAuth a good protocol for Single Sign-on?