NetScaler Basic on-prem authentication

As promised; here’s the first one of the three real-life authentication examples. I will post the next one tomorrow and the final one the day after tomorrow. Overview In this use case the NetScaler acts as a load balancer (aka reverse web proxy) for the web front end servers, but also enables the authenticate, authorize NetScaler Basic on-prem authentication

NetScaler Identity handling capabilities

Overview Far too often I’m facing an assumption that the NetScaler is “just a load balancer” or the Gateway for Citrix environments. Of course it’s true that NetScaler can do both of the above, but it’s capable of so much more. We here at Comping have been working on various cases around identity and NetScaler NetScaler Identity handling capabilities

Security basics, part 5 – How?

Overview You’ve gotten this far so let me wrap this series up for you. Why – Why someone tries to access the environment? Who – Who should be able to access the environment? Can we authenticate the users or identify them in another way? Where – Where are the users connecting from? From the office Security basics, part 5 – How?

Security basics, part 4 – When?

Overview Glad you’re with us still, this one is a bit shorter. Why – Why someone tries to access the environment? Who – Who should be able to access the environment? Can we authenticate the users or identify them in another way? Where – Where are the users connecting from? From the office network? Some Security basics, part 4 – When?

Security basics, part 3 – Where?

Overview Now that we’ve discussed about who, we can move to the next one, which is where? In this post I’m trying to stay more on the conceptual level and bearing in mind that the audience remains the same. Topics Why – Why someone tries to access the environment? Who – Who should be able Security basics, part 3 – Where?

Security basics, part 2 – Who?

Overview Let’s continue on the basics and scratch the surface a bit harder this time :). The post get’s a bit more technical and has some acronyms in it, but still very much on high level. Applying these measures requires a better understanding of who, where, when and how. Topics Why – Why someone tries Security basics, part 2 – Who?

Security basics, part 1 – Why?

Overview This series discusses on the security on higher level so it doesn’t get too technical and is aimed for IT service owners and decision-makers. Focus is on prevention rather than the aftermath after something’s gone wrong. Topics Why – Why someone tries to access the environment? Who – Who should be able to access Security basics, part 1 – Why?

Opening words

There are a lot of great blogs and experienced bloggers out there, some more technical, some on higher level, so what harm could one more cause? Author My name is Kari Ruissalo and I’m working mainly with identity and access management both as a consultant and providing continuous services for our customers. My areas of Opening words