This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
Authentication Tackles Forests at Microsoft Ignite
Authentication is an issue on a personal computer. It's a complex problem in AD forest management.
ORLANDO -- Microsoft Ignite 2017 -- Who are you? It's a deeply metaphysical question. It's one of my favorite songs by The Who. And it's the question that lies at the beginning of just about every security discussion going on at Ignite 2017 in Orlando.
The discussions that I had with vendors and practitioners at Ignite looked at this basic question on several levels. The flashiest level is, in most respects, the easiest because it deals with users one at a time. How do you tell that the user logging into the computer is legitimate? You can use facial recognition or other biometric markers as a piece in a two-part authentication scheme. You can require strong passwords. There are many options, but each one deals with the authentication of a single individual.
When you start talking about authenticating 100,000 users or more, it's an entirely different discussion. A number of the sessions I heard (and conversations I had) dealt with managing authentications across Active Directory forests or collections of forests.
Microsoft spent quite a bit of time at Ignite talking about the tools available for automating deployment of role-based access control and management in IT infrastructures that span on-premise, hosted service and cloud-based platforms that must support single sign-on from tens or hundreds of thousands of users.
The key point in much of what Microsoft discussed was automation -- systems that allow thousands of roles to be assigned and deployed based on rules and programmatic action rather than an administrator running through the employee directory and manually building directory entries. The automation continues through policy enforcement, security analysis and issue remediation. Overlaying everything is the common theme that systems are too complex and humans too slow for the traditional relationship to continue.
You're invited to attend Light Reading's 11th annual Future of Cable Business Services event. Join us in New York on November 30 for the premier independent conference focusing on the cable industry's continuing efforts in the commercial services market – all cable operators and other communications service providers get in free.
One of the focal points of that automation is sharing an identity across different applications, servers and forests. Since most organizations are still using single-factor authentication requiring strong passwords, rational security professionals recognize that requiring employees to create and remember multiple strong passwords (that change on a frequent basis) isn't a great solution. Making the IT system do the heavy lifting to keep a single authenticated identity valid across multiple domains makes sense. It's not that it's wrong -- it's just very complicated.
At Ignite, there were 151 sessions and classes devoted to security. We're going to be writing about some of the products, technologies and strategies covered in those sessions in the coming days and weeks. To help our coverage, let us know what you most want to know about Microsoft's tools for automating security -- and security in general. Is it cross-forest authentication? Graph as a security tool? Security automation using Windows Defender ATP and System Center? We'd like to hear about what you most want to know. And if you were at Ignite, we'd love to hear your thoughts on the conference!
The 10 Most Impactful Types of Vulnerabilities for Enterprises TodayManaging system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Enterprise Vulnerabilities From DHS/US-CERT's National Vulnerability DatabaseCVE-2023-1172 PUBLISHED: 2023-03-17
The Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the full name value in versions up to, and including, 21.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that w...
The WP Express Checkout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘pec_coupon[code]’ parameter in versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping. This makes it possible for authenti...
A vulnerability was found in SourceCodester Student Study Center Desk Management System 1.0. It has been rated as critical. This issue affects the function view_student of the file admin/?page=students/view_student. The manipulation of the argument id with the input 3' AND (SELECT 2100 FROM (SELECT(...
A vulnerability classified as critical has been found in SourceCodester Student Study Center Desk Management System 1.0. Affected is an unknown function of the file Master.php?f=delete_img of the component POST Parameter Handler. The manipulation of the argument path with the input C%3A%2Ffoo.txt le...
A vulnerability classified as critical was found in SourceCodester Student Study Center Desk Management System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/?page=reports&date_from=2023-02-17&date_to=2023-03-17 of the component Report Handler. The manipula...
To save this item to your list of favorite Dark Reading content so you can find it later in your Profile page, click the "Save It" button next to the item.
If you found this interesting or useful, please use the links to the services below to share it with other readers. You will need a free account with each service to share an item via that service.