Types of Access Control

folder_openGeneral, White Papers
IT offers a lot of different models od access control to define rules for access, using different properties or attributes. They all can be individually set and maintained. Which model is the right one, depends on individual requirements, and the desired level of security of each organisation. With access control it is possible to limit…

All Roads Lead to Rome – Many Factors to More Secure Data

folder_openGeneral, Recommendations
According to a Statisa survey only about half of the interviewed internet users in Germany use a second factor for at least one more service apart from online banking. But what exactly is two-factor, or multi-factor authentication (MFA)? And why should more people use it? The use of a second factor ensures that applications and…

Don’t Be Scared of OpenLDAP 2.5

folder_openGeneral
For more than a year there have been two versions of OpenLDAP, 2.5 and 2.6, yet there are more than a few who still use the version 2.4. This might be for different, sometimes very relatable, reasons. DAASI International however recommends to migrate to one of the higher versions. In the following text you can…

Partner Gluu Introduces New Open Source Strategy

folder_openGeneral
At the beginning of the year, the American company Gluu announced their new open source strategy with the promise of new opportunities for their customers. In order to ensure that the core functions of the Gluu Server will forever remain open source, the company started as recently as December 2020 the Janssen Project under the…

Trainings by DAASI International

DAASI International has been instrumentalising their expertise in IAM to support customers for more than twenty years. Throughout the years, the guiding maxims have always been: open source, open standards, transparency, and informational self-determination. In customer projects, as well as in trainings, these principles are taught and practiced by our staff members. For the former,…

BSI Warning for Log4j Vulnerability

folder_openGeneral
2021 December 11, German Federal Office for Information Security (BSI) has published an urgent warning regarding the “log4j 2” Java programming library [1]. See [2] for English information on this vulnerability. DAASI International is not generally using this software library, with few exceptions. The following DAASI International products and solutions are therefore not affected: OpenLDAP…

DAASI International Supports Open Source Community with a Basic Code Foundation for ICF Connector

folder_openAbout DAASI International, General
Technology Fit for the Future with Open Source We encounter open source technology in a growing number of everyday situations. Even politics and economy would hardly be able to function without it. A study recently published by the European Commission further confirmed this notion with their findings on potentials of open source. “We are convinced…

New Demo for IAM Software Suite didmos

folder_openAbout DAASI International, General
As IT service provider for IAM with open source, DAASI International offers services for multiple different solutions. For many years now, one of these solutions has been didmos by DAASI International, it is a software suite for Identity & Access Management, which is exceptional in its high level of flexibility and standard compatability. didmos originated…

Customised IT Security with Modularity and Open Source

folder_openGeneral, Recommendations
In our digital world, data is amongst the most valuable as well as the most vulnerable goods we have; this is especially true for personal data. Thus, for all organisations processing or managing personal data a customised IT security concept is imperative. More often than not, the necessary individual requirements cannot be satisfied with just…
Menu
WordPress Cookie Plugin by Real Cookie Banner