Symantec SiteMinder Community Blog

 View Only
Digital transformation is the oft used phrase to describe the most recent evolution of connecting an organization and its constituents, such as customers, partners, citizens, employees, and even regulators via software. This current wave of evolution ...
0 comments
Recon is almost always the first step hackers, resort to understand the various ways they can hack their target organization. LDAP reconnaissance is a type of internal recon technique used to discover users, groups and other critical information. Adversaries ...
0 comments
Hi All! Read this article by Uzi Cohen to learn how to handle the collection and aggregation of logs from applications running in containers on Kubernetes into centralized log storage. https://bit.ly/2FNzup2 Also, stay tuned for more in this blog ...
0 comments
As more and more digital business initiatives emerge, which require applications and data to be accessed by those outside the corporate perimeter, the adoption of federation technologies has risen dramatically. Among these technologies, OpenID Connect ...
0 comments
As businesses move toward engaging their customers and employees through more digital experiences, there is an increasing risk to security due to the widening of the attack surface. This is driven by the adoption of emerging technologies across distributed ...
0 comments
Hi Access Management community members! We have a new 20-minute webinar, Facilitating Secure DevOps, by @Herbert Mehlhorn , Product Management leader for Access Management at Broadcom. ​Check it out here and let us know what you think! Webinar description: ...
0 comments
Sascha Preibisch's Blog: HowTo – Integrating OTK with external Login-Server Posted by Sascha Preibisch Oct 4, 2016 Many of our customers have asked us to support easy integration of OTK with an external, existing Login-Server. Until now it ...
1 comment
Layer7 Technologies, a Broadcom Company, is continually working to improve our software and services to best meet the needs of our customers. Broadcom/CA software products will be adding support for open-source implementations of Java. Specifically, we ...
0 comments
CA Technologies, a Broadcom Company, is continually working to improve our software and services to best meet the needs of our customers. Broadcom/CA software products will be adding support open-source implementations of Java. Specifically, we are incorporating ...
0 comments
Please open the attached document. Layer7_SiteMinder_AdoptOpenJDK_Announcment_Final.pdf
0 comments
In 12.8.2, we released new capabilities for the Access Gateway in Layer7 SiteMinder (formerly CA Single Sign-On), which can be configured using ACO parameters. Keep reading to see what these ACO parameters and the corresponding capabilities are. ...
0 comments
This blog helps you understand how JWT powers the Layer7 APIM-Layer7 SiteMinder integration. This blog does not emphasize the technical details of JWT or the configuration details of CA APIM and CA SSO. Why do you care about managing access ...
0 comments
2018 witnessed numerous breaches in large enterprises and government organizations, affecting billions of user records. The trend continues in 2019 and in short, there is no surprise in the statement that data breaches have become the norm across ...
0 comments
Summary: JWT authentication is supported from CA SSO 12.8 release. It is supported with Access Gateway and SDK only, but not with web agents. This document provides how to use custom FCC for JWT authentication. Custom Web Forms (FCC) with JWT ...
0 comments
User Authentication in SAML and OIDC federation Federation was designed to enable trustworthy access across separately managed domains of users and information. Described simply, in federation one domain (or organization) maintains a population ...
0 comments
Many organizations are migrating elements of their IT infrastructure to the cloud and adopting a “cloud first” approach. It’s a significant step for CTOs/CIOs to take, as it requires a new mindset, new tooling and has an impact on people, processes and ...
0 comments
Session store is required to persist user session data, authentication context data and other contextual attributes in both federation and non-federation flows. This not only provides enhanced session security but can also be applied across applications ...
2 comments
In the world of digital technology, with rapid transformation of technologies supporting various business functions, you deal with disparate applications posing a variety of challenges. One such challenge of paramount importance is "Providing seamless ...
0 comments
D evOps has become a widespread practice not just to continuously integrate software in a more automated way, but it has evolved towards more continuous delivery in production. REST APIs are key enablers of these workflows in DevOps by helping with the ...
3 comments
Goal #3: Developing Standardized, Reusable Components In our journey so far, we’ve discussed how to achieve our first two goals in building an IAM operations software factory, simplifying application onboarding and creating an enterprise IAM framework ...
1 comment