Articles
Secure authentication with FIDO2
The FIDO and FIDO2 standard supports passwordless authentication. We discuss the requirements for the use of FIDO2 and show a sample implementation for a web service.
Identity and access management with OpenIAM
Identity and access management plays a central role in modern IT infrastructures, with its local resources, numerous applications, and cloud services. We investigate how OpenIAM implements centralized user management.
Securing and managing Microsoft IIS
If you use IIS on Windows servers, you can fully access the web server's features and manage it effectively with on-board tools, including the well-known Internet Information Services (IIS) Manager, Windows Admin Center, and PowerShell.
New features in PHP 8
After about two years of development, version 8 of the popular PHP scripting language has been released. It comes with a number of innovations and ditches some obsolete features
MinIO: Amazon S3 competition
MinIO promises no less than a local object store with a world-class S3 interface and features that even the original lacks.
Managing access credentials
Most Internet services require password-protected individual accounts. A password manager can help you keep track of all your access credentials.
Real-time log inspection
Teler is an intrusion detection and threat alert command-line tool that analyzes logs and identifies suspicious activity in real time.
Endlessh and tc tarpits slow down attackers
Keep an attacker's connections open in an Endlessh "tarpit" or delay incoming connections with the more traditional rate-limiting approach of tc.
Machine learning and security
Machine learning can address risks and help defend the IT infrastructure by strengthening and simplifying cybersecurity.
Single sign-on with Keycloak
Google and Facebook are two of the biggest providers for single sign-on on the web, with OAuth2 and OpenID, but if you don't want to put your customers' or employees' data in their hands, Red Hat's Keycloak software lets you run your own operations with the option of integrating existing Kerberos or LDAP accounts.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.
