home.social

#accesscontrols — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #accesscontrols, aggregated by home.social.

  1. One of the #accesscontrols that #socialmedia should have is to only allow users to post to my account if they have been introduced to it/me by an account which I have given that #trust to. An #introduction by a (real) friend, or possibly someone ex officio.

    It is much less important to me than to the many or all young #women who suffer from #anonymous #misogyny .

    theguardian.com/commentisfree/

  2. 🥱 So, #Tailscale is rolling out "easier" access controls, because apparently, reading ACL syntax is just too much for our fragile developer brains. 🚀 But fear not, you can now binge on buzzwords like "Zero Trust" and "AI Workloads" while pretending you understand them. 🙄
    tailscale.com/blog/grants-ga #AccessControls #ZeroTrust #AIWorkloads #DeveloperHumor #TechNews #HackerNews #ngated

  3. Finally finished my #authelia setup yesterday. #SSO is amazing. Strong #password + #2FA everywhere just feels right.

    Not only that, but you can also configure #AccessControls and trusted #IPRanges.

    Since i'm not the only user on my #server, having fine-grained control is very welcome.

    #security #linux #homelab #selfhosting

  4. I'm not wild about the "Year of" trope, but I think we can go ahead and call this the Year of Agentic AI. I've rarely seen one topic so thoroughly absorb the entire industry's attention.

    #Cybersecurity often follows the initial hype around the latest shiny object. Still, some IT pros and vendors are considering what #agenticAI means for security, particularly in identity and access management.

    In this feature that was months in the making, experts from academic, vendor, and enterprise backgrounds weighed in.

    #AIagents #IAM #identityandaccessmanagement #SecOps #ITOps #identitysecurity #PAM #abac #accesscontrols #AI #GenAI #LLMs

    techtarget.com/searchitoperati

  5. I’d like it if the #AWS #ECR #lifecycle #policy preview were sufficient for my situation. But it’s not.

    I have a #repository with lots of #accesscontrols around it, so I can’t just rewrite its lifecycle policy at the drop of a hat. And I don’t want to copy a bunch of images around to set up a #simulation on a #throwaway repository, when all I really need is the #metadata.