Authentication Tackles Forests at Microsoft Ignite

  /     /     /  
Publicated : 22/11/2024   Category : security


Authentication Tackles Forests at Microsoft Ignite


Authentication is an issue on a personal computer. Its a complex problem in AD forest management.



ORLANDO -- Microsoft Ignite 2017 -- Who are you? Its a deeply metaphysical question. Its one of my favorite songs by The Who. And its the question that lies at the beginning of just about every security discussion going on at Ignite 2017 in Orlando.
The discussions that I had with vendors and practitioners at Ignite looked at this basic question on several levels. The flashiest level is, in most respects, the easiest because it deals with users one at a time. How do you tell that the user logging into the computer is legitimate? You can use
facial recognition
or other biometric markers as a piece in a two-part authentication scheme. You can require strong passwords. There are many options, but each one deals with the authentication of a single individual.
When you start talking about authenticating 100,000 users or more, its an entirely different discussion. A number of the sessions I heard (and conversations I had) dealt with managing authentications across
Active Directory forests
or collections of forests.
Microsoft spent quite a bit of time at Ignite talking about the tools available for automating deployment of
role-based access control
and management in IT infrastructures that span on-premise, hosted service and cloud-based platforms that must support single sign-on from tens or hundreds of thousands of users.
The key point in much of what Microsoft discussed was automation -- systems that allow thousands of roles to be assigned and deployed based on rules and programmatic action rather than an administrator running through the employee directory and manually building directory entries. The automation continues through policy enforcement, security analysis and issue remediation. Overlaying everything is the common theme that systems are too complex and humans too slow for the traditional relationship to continue.
Youre invited to attend Light Readings 11th annual
Future of Cable Business Services event
. Join us in New York on November 30 for the premier independent conference focusing on the cable industrys continuing efforts in the commercial services market – all cable operators and other communications service providers get in free. 
One of the focal points of that automation is sharing an identity across different applications, servers and forests. Since most organizations are still using single-factor authentication requiring strong passwords, rational security professionals recognize that requiring employees to create and remember multiple strong passwords (that change on a frequent basis) isnt a great solution. Making the IT system do the heavy lifting to keep a single authenticated identity valid across multiple domains makes sense. Its not that its wrong -- its just very complicated.
At Ignite, there were 151 sessions and classes devoted to security. Were going to be writing about some of the products, technologies and strategies covered in those sessions in the coming days and weeks. To help our coverage, let us know what you most want to know about Microsofts tools for automating security -- and security in general. Is it cross-forest authentication? Graph as a security tool? Security automation using Windows Defender ATP and System Center? Wed like to hear about what you most want to know. And if you were at Ignite, wed love to hear your thoughts on the conference!
Related posts:
Three Reasons Facial Recognition Will Win
Microsoft Ignite: 9 Things to Know
Microsofts Nadella Shares the Future at Ignite
— Curtis Franklin is the editor of
SecurityNow.com
. Follow him on Twitter
@kg4gwa
.

Last News

▸ 27 Million South Koreans Hit by Online Gaming Theft. ◂
Discovered: 23/12/2024
Category: security

▸ Homeland Security Background Checks Breach Raises Concerns. ◂
Discovered: 23/12/2024
Category: security

▸ Fully committed to the future world of technology. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Authentication Tackles Forests at Microsoft Ignite