Blog-Eintrag -

Securing your identities for cloud applications like Microsoft Office 365

Using cloud applications is very common today. Each user tend to use several different cloud services and applications every day in working life. To work efficiently and secure you should define you own cloud strategy for your organization.

There are lots of things to consider regarding security when you define your cloud strategy. How secure is the cloud application? How secure is your data in the cloud application? Who has the right to the data? Can you move to another cloud application and transfer your data? And lots of more…

When using Microsoft Office 365 you need to consider how you secure your identities. StrongAuthentication/2FA, is a obvious selection. You want to avoid managing and storing passwords or password hashes in the cloud. Your identities should be able to be used in other cloud applications than Office 365. You don’t want to maintain several identities for each user and cloud service. Besides your users want it to be easy to logon and they don’t want to remember different credentials for each application. In the best case your users want it to be secure as well, but certainly you want your organizations data to be protected. Use strongauthentication for your cloud applications. Your cloud strategy should contain a solution for Cloud SSO. Then your users can use one single identity for any cloud application.

/ Stefan Sundh, Solution Architect

Themen

  • Daten, Telekom, IT

Kategorien

  • nexus
  • security
  • blog

Regionen

  • Bayern

Kontakt

Zugehörige Meldungen

  • neXus liefert Dienstausweislösung für die Gemeinde Ale

    Gemeinsam mit neXus hat die Gemeinde Ale eine Lösung für die Produktion und Verwaltung von Dienstausweisen für alle seine Mitarbeiter entwickelt. Die Gemeindeverwaltung plant, dem gesamten Personal eine sichere Identifizierungs-Lösung bereitzustellen, die sowohl zur sicheren Anmeldung am Arbeitsplatz-PC als auch für den Zugang zu Gebäuden, für Druckaufträge und vieles mehr verwendet werden kann.

  • it-sa 2015: neXus präsentiert Lösungen für Berechtigungsmanagement

    neXus, ein führender internationaler Anbieter von Sicherheitslösungen und -dienstleistungen, stellt bei der diesjährigen IT-Security Messe it-sa in Nürnberg (6.-8. Oktober 2015, Stand 514/IAM-Area) das Thema Besucher- und Berechtigungsmanagement in den Vordergrund seiner Messepräsenz.

  • Identitätsmanagement für Banken

    Am 12. Februar 2016 erörterte das Finanzmagazin gi geldinstitute einen in einem Artikel über neXus die Wichtigkeit eines professionellen Identitätsmanagements für Banken.

  • The SCIM standards just grew up to become RFC's

    Integrity and simplicity for both users and IT-departments just took a huge step forward on the Internet. The SCIM specifications, System for Cross-Domain Identity Management, are now published as publications by the Internet Engineering Taskforce (IETF) as RFC7643 and RFC7644. At neXus we are super proud because we have been playing a key part of the specifications.

  • The Hacked Jeep is not alone

    As I wrote about in the blog post “Demystifying Security and Identities for Internet of Things” it is essential to implement security by design. The recent article in Wired shows how the threat is real and even though causing accidents might not be the prime target it points out that we need to take what we have learnt when opening up systems and API to the IoT world and not just care about remote

  • The IETF #93 meeting is wrapping up and it was a great week

    An very intensive Internet Engineering Task Force (IETF) week in Prague is just winding down. It’s been a great week in warm and welcoming Prague. IETF works on the specifications that together form the Internet and IETF attendees meets three times a year to try to make the internet, slowly but consistently, a better place. The gathering consists of quick presentations and long discussions in spec

  • Server Name Indication and Hybrid Access Gateway

    ​SNI is an extension to TLS that has been around for a while, since 2003, but is becoming more and more important as installations become multi tenant with customers from completely different organizations.