Blog post -

Securing your identities for cloud applications like Microsoft Office 365

 Using cloud applications is very common today. Each user tend to use several different cloud services and applications every day in working life. To work efficiently and secure you should define you own cloud strategy for your organization.

There are lots of things to consider regarding security when you define your cloud strategy. How secure is the cloud application? How secure is your data in the cloud application? Who has the right to the data? Can you move to another cloud application and transfer your data? And lots of more…

When using Microsoft Office 365 you need to consider how you secure your identities. StrongAuthentication/2FA, is a obvious selection. You want to avoid managing and storing passwords or password hashes in the cloud. Your identities should be able to be used in other cloud applications than Office 365. You don’t want to maintain several identities for each user and cloud service. Besides your users want it to be easy to logon and they don’t want to remember different credentials for each application. In the best case your users want it to be secure as well, but certainly you want your organizations data to be protected. Use strongauthentication for your cloud applications. Your cloud strategy should contain a solution for Cloud SSO. Then your users can use one single identity for any cloud application.

/ Stefan Sundh, Solution Architect

Topics

  • Data, Telecom, IT

Categories

  • technology nexus
  • blog
  • security

Regions

  • England

Contacts

Related content

  • neXus supplies service card solutions to municipality of Ale

    Municipality of Ale has negotiated a solution for the production and administration of service cards for all its employees. The management of the municipality wanted all personnel to have secure identification that could also be used for secure login, and for access, print-on-demand etc.

  • Carolen Ytander new CMO for neXus

    neXus is boosting its company management by recruiting Carolen Ytander to head up marketing, communications and strategic HR. Carolen most recently worked at Vattenfall, where she held a number of executive positions, including Head of Nordic Marketing.

  • neXus strengthens focus on Nordics – recruits Marcus Persson from Atea

    neXus now further strengthens its focus on the Nordic market by recruiting Marcus Persson as new regional manager for the company in the Nordics. Marcus comes from Atea where he has had several managerial positions and most recently been responsible for Atea’s business agreements in Sweden.

  • neXus appoints new CFO

    Magnus Karlsson joins neXus as CFO on February 22, 2016, becoming a new member of the group management. Magnus succeeds Björn Johansson, who has decided to seek new challenges outside the group after nine years with neXus.

  • Six themes drive identity management in 2016

    For neXus, the leading global provider of security solutions and services, identity management will be one of the central issues in the context of IT security in 2016. The trends such as continuous flexibilization in the working environment, new forms of customer communication and the growing number of cyber-attacks are responsible for this.

  • The SCIM standards just grew up to become RFC's

    Integrity and simplicity for both users and IT-departments just took a huge step forward on the Internet. The SCIM specifications, System for Cross-Domain Identity Management, are now published as publications by the Internet Engineering Taskforce (IETF) as RFC7643 and RFC7644. At neXus we are super proud because we have been playing a key part of the specifications.

  • The Hacked Jeep is not alone

    A recent article in Wired shows how the threat is real and even though causing accidents might not be the prime target it points out that we need to take what we have learnt when opening up systems and API to the IoT world and not just care about remote access to IoT, its also about how different objects in the near perimeter act and are authorized to act.

  • The IETF #93 meeting is wrapping up and it was a great week

     An very intensive Internet Engineering Task Force (IETF) week in Prague is just winding down. It’s been a great week in warm and welcoming Prague. IETF works on the specifications that together form the Internet and IETF attendees meets three times a year to try to make the internet, slowly but consistently, a better place. The gathering consists of quick presentations and long discussions in

  • Explosion in IoT reveals risk of massive black market

    In a recent report Gartner predicts that by 2020 over 50% of new major business process and system will incorporate some element of the Internet of Things. From a security perspective this growth will ...

  • Identity data capture and validation is key

    This week I had the pleasure of visiting NORSIS event IDentitet 2016 in Oslo. Very well structured the event started with presentations around the capturing and validation of identity data which is fundamental for the trust in eIDs (and of course other types of credentials).

  • Server Name Indication and Hybrid Access Gateway

    ​SNI is an extension to TLS that has been around for a while, since 2003, but is becoming more and more important as installations become multi tenant with customers from completely different organizations.