Migrating Apps with Header-based Authentication to Okta via Datawiza Access Proxy

As organizations increasingly adopt cloud computing and modernize their infrastructure, ensuring secure and efficient access to applications becomes crucial. This blog post will discuss how to migrate apps using header-based authentication to Okta with the help of Datawiza Access Proxy (DAP), a secure and scalable solution. We’ll delve into the challenges of header-based authentication, the […]
Seamlessly Migrate Apps That Use Header-Based Authentication to Azure AD with Datawiza Access Proxy

Introduction As organizations continue to modernize their IT infrastructure, legacy applications that use header-based authentication can present significant challenges, especially regarding security and access management. Applications that use header-based authentication, such as Peoplesoft, Siebel, JD Edwards (JDE), NetWeaver Portal, and WebCenter, are often protected by outdated identity and access management systems that lack modern security […]
Add Azure AD SSO to Superset using Datawiza in 5 mins

Do you want to learn how to add Azure AD SSO to your Superset without writing code? In this step-by-step tutorial, you will learn how to integrate Superset with Azure Active Directory (Azure AD) using Datawiza to implement OIDC/OAuth SSO authentication in 5 mins. Note that Datawiza is a generic identity-aware OIDC/OAuth/SAML proxy with […]
How to secure our applications by using the Datawiza Access Proxy

A Zero Trust architecture helps to prevent successful data breaches by eliminating the concept of “trust” from an organization completely
Preparing for Cyber Insurance? 6 Questions to Ask Your IT Team Today

The list of companies that have experienced data breaches in 2022 continues to grow, including Meta, Samsung, Twilio, Twitter, Uber and more. If these companies – with their large, dedicated cybersecurity teams – are vulnerable, so is every other company. No wonder the cyber insurance market is expected to grow at a compound average rate of almost 25 percent […]
How to Meet Cyber Insurance MFA Requirements for Non-Standard but Critical Apps – In Minutes

The successful attack on Twilio reminds us that cyberattacks, especially in the form of ransomware, continue to soar, leading to significant costs and brand damage. For many CEOs, their worst nightmare is seeing the company logo emblazoned on a Wall Street Journal article about a large ransomware payout or a successful hack and leak of […]
5 Things to Do at This Year’s Gartner IAM Summit

Special offer: Register with priority code “IAM17EDC” to save $350 on the standard price. Businesses have some tough decisions ahead related to their identity and access management (IAM) strategy. They’re under tremendous pressure to rapidly secure their environments and progress toward establishing a zero trust architecture. As part of this, they need to figure out […]
How to Specify Tenants When Building an Azure AD Multi-Tenant Application without Coding

Introduction to multi-tenant Azure Active Directory (Azure AD) applications If you provide a Software-as-a-Service (SaaS) application to many organizations or build a B2B partner-facing application for many partners, you can integrate your application with Azure AD to accept logins from any Azure Active Directory (Azure AD) tenant. This is known as making your application multi-tenant. […]
Zero Trust Network Access (ZTNA) vs. Zero Trust Application Access (ZTAA): Which Is Better?

The concept of zero trust, first defined by John Kindervag in 2010 when he was an analyst at Forrester Research, has gained a lot of momentum in recent years. A zero trust architecture assumes an inherently hostile network and treats every user request as an external party. This practice has been crucial to secure increasingly […]