Identity Management

Risk is Reality: Our Take on the Recent Auth0 Vulnerability

Last month, another major identity management vendor revealed a significant vulnerability. This time it was Auth0. While conducting its own research, Cinta Infinita discovered the vulnerability in Auth0’s Legacy Lock API. The security firm noted it “was able to bypass … Read MoreRead More

Keeping the “Internet of Things” Simple

I once received a lengthy letter from a friend of mine that quoted the old adage, “I would have written a shorter letter, but I didn’t have the time.” We often find in our lives that there is too little … Read MoreRead More

Forum Systems and Spargonet to Host Identity Management Webinar

Event Highlights Forum Systems and Spargonet will host a webinar titled “Fundamentals of Identity Management for Mobile and Cloud Computing” on Thursday, June 26, 2014 from 11:00am – 12:00pm EDT. Participants of this webinar will gain valuable insight into the … Read MoreRead More

Three Federated API Requirements for Enterprise Cloud Computing

Successful enterprise API implementations are built on a set of localized, project-level efforts with services that have clearly identified and accountable business and technology owners. Ownership defines an API domain. Deciding what services are core to a business owner and should … Read MoreRead More

API Identity Management with LDAP Server

Most corporations deploy LDAP severs such as OpenLDAP to store identities used for SSO and API identity management.   Application users authenticate against these LDAP servers to gain access to APIs.  To avoid an intrusive, non-scalable agent-based model — where … Read MoreRead More

Online LDAP Test Server

LDAP severs are a key infrastructure component required to enable access control for APIs. We have provided a LDAP server with a few entries with which you can test your LDAP connectivity, binding and user credential authentication. … Read More

Using HTTP Basic Auth for API Identity Management

APIs are proliferating corporate networks. Business owners seek APIs that solve their requirements regardless of whether the APIs are homegrown or provided by 3rd parties. For both cases — internal and external APIs — controls have to be enforced on who gets to use what API. This level of API control requires enabling Identity Management for APIs. … Read More