资讯

When we talk about security assessments, the first thing that comes to mind is a snapshot of a company’s security posture: vulnerabilities, misconfigurations, uncontrolled access, and so on. But ...
In this article I’ll guide you step-by-step through configuring Keycloak to connect to an LDAP server using a secure LDAPS (SSL/TLS) connection, with support for certificates signed by either internal ...
Introduction Windows environments rely heavily on authentication protocols like NTLM and Kerberos. While these protocols serve critical security purposes, they are also commonly abused during ...
An overview of the joint Axelos and Atlassian paper on integrating ITIL® 4 into modern ITSM workflows. In partnership with AXELOS, Atlassian has created a practical guide to help IT teams embrace this ...
One of the most annoying aspects of using Sealed Secrets is their encryption design. They are tightly coupled to the namespace and name of the target Secret, meaning any changes to either require ...
In most cases, we process the alerts sent by Alertmanager (Prometheus’ alert management system) using Tornado, where they are grouped based on labels – not following the traditional “Host” or “Service ...
Now let’s continue with the creation of a Tornado rule: open the NetEye web interface and select Tornado dashboard, then open the processing tree and select Edit mode On. Now select the filter and add ...
Welcome back to our ongoing series on creating online IT tutorial videos. The last two times we talked about speeding up your graphics, and how the entire workflow works from writing all the way to ...
If you’ve ever tried integrating an external system or website with Jira Service Management (JSM), you’ve probably hit one or more roadblocks, especially when it comes to creating requests on behalf ...
Ein kurzer Rückblick GLPI steht für „Gestionnaire Libre de Parc Informatique“, auf Deutsch etwa „Freie Software zur Verwaltung der IT-Infrastruktur“. Der Grundgedanke ist es, ein zentrales System zu ...
This guide illustrates the steps required to adopt Nextcloud on-premise, configuring it for LDAP integration, SSO and MFA, using a preconfigured Virtual Machine. Wing FTP, while useful for years in ...