home.social

#identityprovider โ€” Public Fediverse posts

Live and recent posts from across the Fediverse tagged #identityprovider, aggregated by home.social.

  1. Install #Authentik IdP on #Debian VPS This article provides a guide to install Authentik IdP on #Debian VPS.
    What is Authentik?
    Authentik is an open-source Identity Provider (IdP) designed to handle authentication and authorization for applications and users. It offers centralized identity management and is highly flexible, making it suitable for organizations of all sizes. Authentik ...
    Continued ๐Ÿ‘‰ blog.radwebhosting.com/install #identityprovider #installguide #letsencrypt #vpsguide #reverseproxy

  2. Install #Authentik IdP on #Debian VPS This article provides a guide to install Authentik IdP on #Debian VPS.
    What is Authentik?
    Authentik is an open-source Identity Provider (IdP) designed to handle authentication and authorization for applications and users. It offers centralized identity management and is highly flexible, making it suitable for organizations of all sizes. Authentik ...
    Keep reading ๐Ÿ‘‰ blog.radwebhosting.com/install #identityprovider #letsencrypt #vpsguide #reverseproxy #installguide

  3. ๐Ÿš€ UCS 5.2 erscheint am 5. Februar 2025!

    Mit der neuen Version wird #Keycloak der alleinige #IdentityProvider und die Basis auf Debian 12 โ€žBookwormโ€œ aktualisiert โ€“ inkl. OpenLDAP 2.5, Samba 4.21, Docker und PostgreSQL.

    UCS 5.0 wird noch ein Jahr unterstรผtzt. Wir empfehlen, die Migration zu Keycloak frรผhzeitig zu planen. Das letzte Update, UCS 5.0-10, erscheint im Mรคrz 2025.

    ๐Ÿ‘‰ Details: univention.de/blog-de/2024/12/

  4. Abbreviations are all good and well until the same is used for multiple adjacent concepts, such as #IDP, which can stand for #InternalDeveloperPlatform as well as #IdentityProvider.

  5. ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—š๐—ฟ๐—ฎ๐—ฝ๐—ต ๐—”๐—ฐ๐˜๐—ถ๐˜ƒ๐—ถ๐˜๐˜† ๐—Ÿ๐—ผ๐—ด ๐—ถ๐˜€ ๐—ก๐—ผ๐˜„ ๐—”๐˜ƒ๐—ฎ๐—ถ๐—น๐—ฎ๐—ฏ๐—น๐—ฒ ๐—ถ๐—ป ๐—ฃ๐˜‚๐—ฏ๐—น๐—ถ๐—ฐ ๐—ฃ๐—ฟ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„

    With Microsoft Graph Activity Logs, you can now investigate the complete picture of activity in your tenant โ€“ from token request in SignIn logs, to API request activity (reads, writes, and deletes) in Microsoft Graph Activity Logs, to ultimate resource changes in Audit logs.

    techcommunity.microsoft.com/t5

    #microsoft #entra #entraid #azuread #graph #microsoftgraph #log #idp #identity #azure #API #soc #itdr #security #cybersecurity #siem #soc #monitoring #loganalytics #sentinel #hunting #cyberthreat #identity #identityprovider #microsoftsecurity

  6. ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—š๐—ฟ๐—ฎ๐—ฝ๐—ต ๐—”๐—ฐ๐˜๐—ถ๐˜ƒ๐—ถ๐˜๐˜† ๐—Ÿ๐—ผ๐—ด ๐—ถ๐˜€ ๐—ก๐—ผ๐˜„ ๐—”๐˜ƒ๐—ฎ๐—ถ๐—น๐—ฎ๐—ฏ๐—น๐—ฒ ๐—ถ๐—ป ๐—ฃ๐˜‚๐—ฏ๐—น๐—ถ๐—ฐ ๐—ฃ๐—ฟ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„

    With Microsoft Graph Activity Logs, you can now investigate the complete picture of activity in your tenant โ€“ from token request in SignIn logs, to API request activity (reads, writes, and deletes) in Microsoft Graph Activity Logs, to ultimate resource changes in Audit logs.

    techcommunity.microsoft.com/t5

    #microsoft #entra #entraid #azuread #graph #microsoftgraph #log #idp #identity #azure #API #soc #itdr #security #cybersecurity #siem #soc #monitoring #loganalytics #sentinel #hunting #cyberthreat #identity #identityprovider #microsoftsecurity

  7. ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—š๐—ฟ๐—ฎ๐—ฝ๐—ต ๐—”๐—ฐ๐˜๐—ถ๐˜ƒ๐—ถ๐˜๐˜† ๐—Ÿ๐—ผ๐—ด ๐—ถ๐˜€ ๐—ก๐—ผ๐˜„ ๐—”๐˜ƒ๐—ฎ๐—ถ๐—น๐—ฎ๐—ฏ๐—น๐—ฒ ๐—ถ๐—ป ๐—ฃ๐˜‚๐—ฏ๐—น๐—ถ๐—ฐ ๐—ฃ๐—ฟ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„

    With Microsoft Graph Activity Logs, you can now investigate the complete picture of activity in your tenant โ€“ from token request in SignIn logs, to API request activity (reads, writes, and deletes) in Microsoft Graph Activity Logs, to ultimate resource changes in Audit logs.

    techcommunity.microsoft.com/t5

    #microsoft #entra #entraid #azuread #graph #microsoftgraph #log #idp #identity #azure #API #soc #itdr #security #cybersecurity #siem #soc #monitoring #loganalytics #sentinel #hunting #cyberthreat #identity #identityprovider #microsoftsecurity

  8. ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—š๐—ฟ๐—ฎ๐—ฝ๐—ต ๐—”๐—ฐ๐˜๐—ถ๐˜ƒ๐—ถ๐˜๐˜† ๐—Ÿ๐—ผ๐—ด ๐—ถ๐˜€ ๐—ก๐—ผ๐˜„ ๐—”๐˜ƒ๐—ฎ๐—ถ๐—น๐—ฎ๐—ฏ๐—น๐—ฒ ๐—ถ๐—ป ๐—ฃ๐˜‚๐—ฏ๐—น๐—ถ๐—ฐ ๐—ฃ๐—ฟ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„

    With Microsoft Graph Activity Logs, you can now investigate the complete picture of activity in your tenant โ€“ from token request in SignIn logs, to API request activity (reads, writes, and deletes) in Microsoft Graph Activity Logs, to ultimate resource changes in Audit logs.

    techcommunity.microsoft.com/t5

    #microsoft #entra #entraid #azuread #graph #microsoftgraph #log #idp #identity #azure #API #soc #itdr #security #cybersecurity #siem #soc #monitoring #loganalytics #sentinel #hunting #cyberthreat #identity #identityprovider #microsoftsecurity

  9. ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—š๐—ฟ๐—ฎ๐—ฝ๐—ต ๐—”๐—ฐ๐˜๐—ถ๐˜ƒ๐—ถ๐˜๐˜† ๐—Ÿ๐—ผ๐—ด ๐—ถ๐˜€ ๐—ก๐—ผ๐˜„ ๐—”๐˜ƒ๐—ฎ๐—ถ๐—น๐—ฎ๐—ฏ๐—น๐—ฒ ๐—ถ๐—ป ๐—ฃ๐˜‚๐—ฏ๐—น๐—ถ๐—ฐ ๐—ฃ๐—ฟ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„

    With Microsoft Graph Activity Logs, you can now investigate the complete picture of activity in your tenant โ€“ from token request in SignIn logs, to API request activity (reads, writes, and deletes) in Microsoft Graph Activity Logs, to ultimate resource changes in Audit logs.

    techcommunity.microsoft.com/t5

    #microsoft #entra #entraid #azuread #graph #microsoftgraph #log #idp #identity #azure #API #soc #itdr #security #cybersecurity #siem #soc #monitoring #loganalytics #sentinel #hunting #cyberthreat #identity #identityprovider #microsoftsecurity

  10. Mit #Keycloak bekommt #UCS einen neuen Standard #IdentityProvider fรผr die sichere Authentifizierung von Nutzer*innen an IT-Diensten รผber das Internet per Single-Sign-on (#SSO).

    Welche Funktionen mit dem neusten Release der UCS Keycloak-App bereitstehen und wie ihr die #Migration auf Keycloak einfach bewerkstelligt lest ihr in unserem Blogartikel:

    univention.de/blog-de/2023/07/

  11. Azure AD Certificate-Based Authentication (CBA) on Mobile now Generally Available!

    You can now provision certificates on a hardware security key, which can then be used for authentication with Azure AD on iOS and Android devices. Microsoft's mobile certificate-based solution coupled with the hardware security keys is a simple, convenient, Federal Information Processing Standards (FIPS) certified phishing-resistant MFA method.โ€ฏ

    techcommunity.microsoft.com/t5

    #microsoft #azure #security #android #hardware #ios #fido2 #mfa #cba #certificatebasedauthentication #phishing #msal #yubikey #certificate #azureactivedirectory #azuread #iam #nfc #microsoftentra #security #identity #identitysecurity #cloudsecurity #identityprovider

  12. Risks Using a Third Party Identity Provider with Azure
    ~~~~~
    ACM.177 Did the US government say you should not use third-party Identity Providers with Azure?
    ~~~~~
    by Teri Radichel | Mar, 2023
    #cloudsecurity #idp #identityprovider #azure #cybersecurity #goldensaml

    medium.com/cloud-security/risk

  13. Even if you are not and do not want to use Okta, this post explains how to create a role for billing administrators that works with upcoming changes to #AWS #billing #IAM permissions.

    Okta SAML Integration with AWS IAM Step 3: Creating SAML Roles ~ ACM.174 Determining permissions for an AWS Billing Administrator Role
    ~~~
    by Teri Radichel | Mar 4, 2023
    #AWS #IAM #SAML #Okta #Billing #IdentityProvider #cloud #security #cybersecurity

    medium.com/cloud-security/okta

  14. Okta SAML Integration with AWS IAM Step 2: AWS IAM Identity Provider ~ ACM.173 Using CloudFormation to deploy an IdP for Okta in AWS
    ~~~~
    by Teri Radichel | Mar 3, 2023
    #aws #iam #idp #okta #saml #cloud #security #cybersecurity #identityprovider medium.com/cloud-security/okta

  15. Unser Development Team hat das Minor-Release #UCS 5.0-3 verรถffentlicht. Die neue Version von UCS bringt viele nรผtzliche neue Features fรผr die #Systemdiagnose und den #Support, Verbesserungen bei der #Performance und es geht weiter auf dem Weg zur Migration auf #Keycloak als neuen Standard #IdentityProvider von UCS.

    Mehr Infos zu den neuen Features & Verbesserungen in unserem Blogartikel:

    univention.de/blog-de/2023/02/

  16. @berkes I voted Integration with Y. I actually wrote a post about it as late as last night, so Iโ€™m linking to that instead of repeating myself here. Itโ€™s basically about a wish for a central profile of yours that you can nominate as your identity profile, for logging in and/or creating accounts on the various Fediverse services. An Identity Provider (IDP) functionality.

    https://moc.d-x-b.com/notice/AR7Hvikp63UxmlQOBM

    #WishList #Fediverse #IdentityProvider #IDP

  17. Con #keycloak sobre #docker podes montar un excelente #IdentityProvider o Proveedor de #identidad para obtener un solo lugar de inicio de sesion para todos tus productos de #software externo y/o interno. Miralo en #CulturaLibre culturalibre.ar/2022/10/19/key

    Si te gusta comparti con los tuyos! #VivaMastodon