Categories
Trust, Identity and Access Blogs UK Access Management Federation

IdPs move to MDQ

IdP operators: consider using MDQ (metadata query) Configuring your self-hosted IdP to use MDQ (metadata query) has three key benefits: a reduced memory footprint mitigation against a class of disruptive errors as the size of metadata increases robustness against problematic metadata. Half of the IdPs in the UK federation use MDQ already. The UK federation […]

Categories
T&I Consultancy Trust, Identity and Access Blogs

COVID-19, acquisitions and IT Mergers: what to do when you need a back-up IT team?

Preparing for a new academic year is always a challenging time for IT teams. However, for New College of Humanities (NCH) in London, summer 2020 brought new challenges entirely.   The IT team was faced with the integration of IT systems after its acquisition by Northeastern University, in the US, while at the same time […]

Categories
OpenAthens Trust, Identity and Access Blogs

Student Voice: 8 lessons from the 20/21 digital experience survey

Have you got a stake in online learning at your institution? Looking for ways to develop your students’ digital experiences in 2022? Then look no further!   Here lies a handy wrap-up of Jisc’s Higher Education (HE) and Further Education (FE) student digital insights surveys. Looking at the good, the bad, and the downright ugly.  Survey […]

Categories
T&I Consultancy Trust, Identity and Access Blogs UK Access Management Federation

Cyber Essentials: why keeping your Shibboleth IdP up to date is crucial

A core aspect of Cyber Essentials is keeping your systems up to date. This is true both for operating systems and any installed apps or software, and these must always be kept updated.   Applying these updates is one of the most important things you can do to improve security. It ensures that devices and software are not vulnerable to known […]

Categories
Trust, Identity and Access Blogs UK Access Management Federation

I’m not a number, I’m a pseudonymous identifier…

“Are THEY listening to us?” “Who’s they?” “You know, the phones, the laptops?” And so goes the conversation that I sometimes have with my wife. Perhaps after we’ve had a chat about hiking poles, when every ad on our social media feed then shows hiking poles, despite neither of us having directly Googled them. (Although […]

Categories
Trust, Identity and Access Blogs

Trust no one; the bad guys are coming down the pipes!

This year’s KuppingerCole European Identity and Cloud conference saw several talks about Zero Trust Models and Passwordless Authentication. No longer in cyber security is it enough to lock your front door and all of your windows, now the bad guys are ‘coming down the pipes’! To use X-Files parlance ‘Trust no one’ — not even […]

Categories
Domain Registry Trust, Identity and Access Blogs

Manage domains for your organisation? Here’s what you need to know about the upcoming changes to key Jisc Services

Welcome to this joint broadcast from Jisc‘s Trust and Identity and Security Services teams! What’s the score? In the new year, we will be changing the way you access the following services, making it easier for you to manage your existing subscriptions: Domain registry service (DRS) Primary nameserver service (PNS) We’re adding these services to the new […]

Categories
T&I Consultancy Trust, Identity and Access Blogs

Six problems solved by single sign-on in colleges and universities

If your institution is considering the move to single sign-on (SSO) solutions, you might find colleagues asking; what does this mean? And what are the benefits?   In short, an SSO authentication platform provides simple access control for authentication and authorisation for a whole organisation. In simple terms, this means users only need a single username […]

Categories
Trust, Identity and Access Blogs UK Access Management Federation

How secure is your access management?

You wouldn’t serve someone alcohol without appropriate ID. Nor would you buy a car without airbags, or leave your phone unlocked in a busy pub. Federated access is the equivalent safety check for students and staff accessing your online resources. So if you’re not using federated access, how secure is your access management set-up?   This post answers this question and […]

Categories
Trust, Identity and Access Blogs

Three easy ways to ensure your corporate data is protected

Online security has never been so important, and protecting corporate data from rising numbers of cyberattacks should be the top priority of every organisation – whether that’s universities, colleges, government or not-for-profit organisations.   Keeping web and email services secure   One way to boost your cyber security is through digital certificates. They help keep your web and […]