<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Canming Jiang</title>
    <description>The latest articles on DEV Community by Canming Jiang (@cjddww).</description>
    <link>https://dev.to/cjddww</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F750771%2F4eee06c7-ccba-4ca1-9364-fec2987c786c.png</url>
      <title>DEV Community: Canming Jiang</title>
      <link>https://dev.to/cjddww</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/cjddww"/>
    <language>en</language>
    <item>
      <title>The Top 6 Customer Identity And Access Management (CIAM) Solutions</title>
      <dc:creator>Canming Jiang</dc:creator>
      <pubDate>Sat, 04 May 2024 01:16:06 +0000</pubDate>
      <link>https://dev.to/cjddww/the-top-6-customer-identity-and-access-management-ciam-solutions-2hia</link>
      <guid>https://dev.to/cjddww/the-top-6-customer-identity-and-access-management-ciam-solutions-2hia</guid>
      <description>&lt;p&gt;In a digital-first world, businesses prioritize the creation of secure, personalized, and effortless user experiences. In pursuit of this, robust Customer Identity and Access Management (CIAM) solutions have grown increasingly important. These platforms handle crucial tasks like identity management, access management, multi-factor authentication (MFA),  single sign-on (SSO), consent and preference management, as well as ensuring security and compliance, all while maintaining scalability. The objective remains ensuring only authorized external customers gain access to resources, all in a user-friendly manner.&lt;/p&gt;

&lt;p&gt;Here, we’ll explore 6 leading CIAM solutions that encompass these features, offering you a snapshot of each platform’s capabilities and strengths.&lt;/p&gt;

&lt;h2&gt;
  
  
  1. &lt;a href="https://aws.amazon.com/cognito/"&gt;Amazon Cognito CIAM&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Amazon Cognito stands out in the landscape of CIAM solutions due to its simplicity and seamless user access management for web and mobile applications. It shines in areas such as user directory management, secure access control, social and email-based login, acting as a versatile solution for B2C and B2B businesses.&lt;/p&gt;

&lt;p&gt;With multi-factor authentication and encryption keys at disposal, Cognito masters security concerns. Its integration capabilities with other AWS services and support for social media accounts login further enhance its appeal in managing user identities.&lt;/p&gt;

&lt;h2&gt;
  
  
  2. &lt;a href="https://learn.microsoft.com/en-us/azure/active-directory-b2c/overview"&gt;Azure Active Directory B2C (Azure AD B2C)&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Azure Active Directory B2C (Azure AD B2C) is a pioneer in the enterprise-level CIAM arena. This solution expertly handles identity management difficulties while offering personalized user interactions, facilitating improved user relationships.&lt;/p&gt;

&lt;p&gt;Azure AD B2C is renowned for its scalability, making it an ideal solution for businesses with large, continuously expanding customer bases. Its ability to effortlessly integrate with numerous third-party platforms, from CRM to marketing platforms, enhances its versatility.&lt;/p&gt;

&lt;p&gt;Highly useful features such as self-service password resets and detailed reporting streamline the handling of an extensive array of customer identities. However, with the arrival of the latest CIAM solution from Microsoft, the Microsoft Entra External ID, the future of Azure AD B2C may potentially transition towards this newer offering.&lt;/p&gt;

&lt;h2&gt;
  
  
  3. &lt;a href="https://learn.microsoft.com/en-us/entra/external-id/external-identities-overview"&gt;Microsoft Entra External ID&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;As the newest CIAM offering from Microsoft, Entra External ID allows organizations secure access to applications and resources, regardless of whether the interactions involve external partners, consumers, or business customers.&lt;/p&gt;

&lt;p&gt;Microsoft Entra External ID incorporates important CIAM features like customizable sign-in experiences, user management, personalized registration flows, and data-driven insights. Its flexibility, coupled with strong security, compliance, and scalability features, solidifies Microsoft Entra External ID as a comprehensive solution for both consumer-oriented app developers and businesses keen on securing B2B collaboration.&lt;/p&gt;

&lt;h2&gt;
  
  
  4. &lt;a href="https://auth0.com/"&gt;Auth0 CIAM&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Auth0 offers robust CIAM capabilities with comprehensive identity and access management. This solution adheres to modern security protocols, ensuring secure user authentication alongside remarkable user experience.&lt;/p&gt;

&lt;p&gt;Famed for its adaptability across different standards and platforms, Auth0 offers a range of integration methods and essential features like Single Sign-On (SSO), multi-factor authentication (MFA), and user management, solidifying its position as a comprehensive CIAM solution.&lt;/p&gt;

&lt;h2&gt;
  
  
  5. &lt;a href="https://www.pingidentity.com/en/platform/solutions/pingone-for-customers.html"&gt;PingOne for Customers&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Spearheading cloud-based CIAM solutions, PingOne enables developers to conveniently customize, deploy, and manage user login experiences. Advanced tools such as secure social login, multi-factor authentication, and user provisioning are at the core of its offerings.&lt;/p&gt;

&lt;p&gt;With the backing of 70% of the Fortune 100, PingOne’s global reach, ease of implementation, and commitment to innovation have marked it as a favorite among numerous organizations.&lt;/p&gt;

&lt;h2&gt;
  
  
  6. &lt;a href="https://www.keycloak.org/"&gt;Keycloak&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;As an open-source CIAM solution, Keycloak offers standard authentication features like Single Sign-On, identity brokering, and social login. It caters to developers with its high level of customizability.&lt;/p&gt;

&lt;p&gt;Keycloak’s ability to integrate seamlessly with corporate LDAP servers and Active Directory is a standout. Its flexibility and configurable nature make it a preferred choice among businesses looking for more customized options.&lt;/p&gt;

&lt;p&gt;Choosing the right CIAM solution depends on several factors, including the size of your customer base, necessary security protocols, integration needs, and budgetary constraints. Whether you run a fledgling startup or command a large corporate entity, the solutions outlined above offer a fantastic starting point on your journey to impeccable customer identity and access management.&lt;/p&gt;

&lt;h2&gt;
  
  
  How Datawiza Streamlines CIAM Solutions Implementation
&lt;/h2&gt;

&lt;p&gt;Datawiza offers a simple, efficient solution to your CIAM implementation challenges.&lt;a href="https://www.datawiza.com/platform/"&gt;Its no-code, proxy-based approach&lt;/a&gt; seamlessly integrates your preferred CIMA solutions with your applications, facilitating quick deployment of crucial CIAM features like Multi-Factor Authentication (MFA) and Single Sign-On (SSO).&lt;/p&gt;

&lt;p&gt;Datawiza’s solution not only accelerates CIAM deployment but also frees up developers for other essential tasks. The reduction in engineering effort is dramatic, slashing the implementation time from months to minutes. Datawiza thus becomes a critical partner in streamlining your CIAM implementation, letting you focus on growing your business.&lt;/p&gt;

&lt;p&gt;Whether you’re a growing start-up or an established enterprise, Datawiza lets you focus on growing your core business while it takes care of the CIAM-related legwork. Streamline your CIAM implementation and free up valuable resources with Datawiza.&lt;/p&gt;

&lt;p&gt;The post &lt;a href="https://www.datawiza.com/blog/industry/the-top-6-customer-identity-and-access-management-ciam-solutions/"&gt;The Top 6 Customer Identity And Access Management (CIAM) Solutions&lt;/a&gt; appeared first on &lt;a href="https://www.datawiza.com"&gt;Datawiza&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>blog</category>
      <category>industry</category>
    </item>
    <item>
      <title>How to Set Up a Private ChatGPT Instance with SSO and MFA</title>
      <dc:creator>Canming Jiang</dc:creator>
      <pubDate>Tue, 19 Mar 2024 18:19:53 +0000</pubDate>
      <link>https://dev.to/cjddww/how-to-set-up-a-private-chatgpt-instance-with-sso-and-mfa-43fi</link>
      <guid>https://dev.to/cjddww/how-to-set-up-a-private-chatgpt-instance-with-sso-and-mfa-43fi</guid>
      <description>&lt;p&gt;In the vast landscape of modern technology, advancements in artificial intelligence (AI) continue to establish connections and foster communications between humans and machines in the most intuitive and engaging manner. One such remarkable innovation is ChatGPT, a conversational AI model developed by OpenAI. This article aims to shed light on the importance of establishing a private ChatGPT instance, the integration of critical security measures such as Single Sign-On (SSO) and Multi-Factor Authentication (MFA), and offer a comprehensive guide to set it up with Microsoft Entra ID (Azure AD) as the Identity Provider (IdP).&lt;/p&gt;

&lt;p&gt;Note the solution works with any identity provider, like Microsoft Entra, Okta, Google, Ping and others. And it can be easily deployed in any environment, like Azure, AWS, Google Cloud or On-premises. &lt;/p&gt;

&lt;h2&gt;
  
  
  Understanding the Importance of a Private ChatGPT
&lt;/h2&gt;

&lt;p&gt;In the fast-paced, data-driven environment of our digital age, the need for privacy and control over one’s own data is paramount. Establishing a private ChatGPT allows companies to have the liberty to customize, moderate, and closely monitor the AI interactions while also incorporating the specific needs and preferences of their user base. Furthermore, a private ChatGPT can function within the data guidelines and compliance requirements of an organization. Setting up a private ChatGPT ensures that you are putting security, privacy, and control on your terms while leveraging advanced AI technology for efficient and personalized communication.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why Incorporate SSO and MFA for ChatGPT
&lt;/h2&gt;

&lt;p&gt;When it comes to ChatGPT, the implementation of SSO and MFA provides a higher degree of access security. Single Sign-On (SSO) enables users to access multiple resources with a single set of credentials, improving user experience by eliminating the need for multiple passwords while providing enhanced security. In turn, Multi-Factor Authentication (MFA) introduces an additional layer of protection by requiring users to provide at least two verification factors to access their accounts, dramatically reducing the chances of fraudulent access.&lt;/p&gt;

&lt;h2&gt;
  
  
  Introduction to the Datawiza Private ChatGPT Solution
&lt;/h2&gt;

&lt;p&gt;The solution combines two major components designed to maximize the performance and security of Private ChatGPT:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Datawiza Access Proxy (DAP): This essential tool enables MFA, SSO, and detailed access control to your Private ChatGPT.&lt;/li&gt;
&lt;li&gt;ChatGPT UI: An intuitive interface designed to interact seamlessly with the OpenAI API, enhancing your user experience.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Importantly, our versatile solution isn’t reserved solely for the OpenAI API. It also works hand-in-glove with other AI platforms such as Llama 2, Mistral AI, and Anthropic Claude API.&lt;/p&gt;

&lt;p&gt;Refer to the following architectural diagram to visualize how these components integrate:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--7bXhC0l7--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://www.datawiza.com/wp-content/uploads/2024/03/private-chatgpt-with-sso-and-mfa.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--7bXhC0l7--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://www.datawiza.com/wp-content/uploads/2024/03/private-chatgpt-with-sso-and-mfa.png" alt="private chatgpt instance with sso and mfa" width="800" height="384"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  The User Flow in a Nutshell:
&lt;/h3&gt;

&lt;p&gt;Here’s how the user experience is streamlined with our solution:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;The user attempts to access the Private ChatGPT through a secured URL, such as &lt;a href="https://chatgpt.example.com/"&gt;https://chatgpt.example.com&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;The user is then redirected to Microsoft Entra ID for login, where they complete the MFA process.&lt;/li&gt;
&lt;li&gt;Upon successful login, the user gains access to the Private ChatGPT UI.&lt;/li&gt;
&lt;li&gt;The user can now interact with the Private ChatGPT UI, input their prompts, and receive responses directly from the OpenAI API.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;With this solution, users gain secure and personalized access to the power of AI, all at their fingertips.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Demo: A Private ChatGPT instance with Microsoft Entra SSO and MFA
&lt;/h2&gt;

&lt;p&gt;Take a closer look at the demo below and witness firsthand how a private ChatGPT instance operates seamlessly with SSO and MFA.&lt;/p&gt;

&lt;h2&gt;
  
  
  Set Up a Secure Private ChatGPT Instance with Datawiza
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Prerequisites
&lt;/h3&gt;

&lt;p&gt;To set up a private ChatGPT, one would need a Datawiza account, Docker, and a ChatGPT User Interface (UI). In essence, these are the building blocks to initiate and install a private ChatGPT.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;An Azure subscription. If you don’t have a subscription, you can get a &lt;a href="https://azure.microsoft.com/free/"&gt;trial account&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;A &lt;a href="https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/active-directory-access-create-new-tenant"&gt;Microsoft Entra ID tenant&lt;/a&gt; that’s linked to your Azure subscription&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://docs.docker.com/get-docker/"&gt;Docker&lt;/a&gt; and &lt;a href="https://docs.docker.com/compose/install/"&gt;docker-compose&lt;/a&gt; are required to run DAP&lt;/li&gt;
&lt;li&gt;An account with Microsoft Entra ID application &lt;a href="https://docs.microsoft.com/en-us/azure/active-directory/users-groups-roles/directory-assign-admin-roles#application-administrator"&gt;admin permissions&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;(Optional) An &lt;a href="https://www.godaddy.com/help/what-is-an-ssl-certificate-542"&gt;SSL Web certificate&lt;/a&gt; for publishing services over HTTPS, or use default Datawiza self-signed certs while testing&lt;/li&gt;
&lt;li&gt;OpenAI API Key&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Deploy the Datawiza ChatGPT UI
&lt;/h3&gt;

&lt;p&gt;We provide a ChatGPT UI image, which we use here as an example of a private ChatGPT UI:&lt;/p&gt;

&lt;p&gt;| docker run -itd -p 3000:3000 –name datawiza-chatgpt-ui -e OPENAI_API_KEY=$OPENAI_API_KEY registry.gitlab.com/datawiza/access-proxy:chatgpt-ui |&lt;/p&gt;

&lt;h3&gt;
  
  
  Getting Started with Datawiza
&lt;/h3&gt;

&lt;p&gt;To integrate the ChatGPT with Microsoft Entra ID, login to &lt;a href="https://console.datawiza.com/"&gt;Datawiza Cloud Management Console&lt;/a&gt; (DCMC).&lt;/p&gt;

&lt;p&gt;Welcome to the DCMC homepage! Let’s get started:&lt;/p&gt;

&lt;p&gt;Click the orange &lt;strong&gt;Getting Started&lt;/strong&gt; button, which will guide you through the configuration steps.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s---QYb0csf--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://www.datawiza.com/wp-content/uploads/2024/03/image2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s---QYb0csf--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://www.datawiza.com/wp-content/uploads/2024/03/image2.png" alt="" width="800" height="290"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Specify &lt;strong&gt;Name&lt;/strong&gt; and &lt;strong&gt;Description&lt;/strong&gt; , and click &lt;strong&gt;Next&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--xYe6bUXi--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://www.datawiza.com/wp-content/uploads/2024/03/image4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--xYe6bUXi--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://www.datawiza.com/wp-content/uploads/2024/03/image4.png" alt="" width="800" height="394"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Add Application
&lt;/h3&gt;

&lt;p&gt;Configure your application with the following values:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Platform&lt;/strong&gt; : Select &lt;strong&gt;WEB&lt;/strong&gt; here.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Name&lt;/strong&gt; : The name of your application. Put a meaningful name here. I use the ChatGPT App.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Application URL&lt;/strong&gt; : The external facing URL of the application. For example, &lt;em&gt;&lt;a href="https://chatgpt.example.com"&gt;https://chatgpt.example.com&lt;/a&gt;&lt;/em&gt;. You can use localhost DNS for testing purposes. I use &lt;em&gt;&lt;a href="https://chatgpt.datawiza.net"&gt;https://chatgpt.datawiza.net&lt;/a&gt;&lt;/em&gt;.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;SSL&lt;/strong&gt; :  Check the Enable SSL and use datawiza self-signed certificate checkbox for testing. For production, you can upload your certificates.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Listen Port&lt;/strong&gt; : This is the port that the DAP listens on. For simplicity, you can use the same port as the one in the Application URL above if you are not deploying the DAP behind a Load Balancer.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Upstream Servers&lt;/strong&gt; : The URL and port combination of the ChatGPT UI. Mine is &lt;em&gt;&lt;a href="http://10.0.0.1:3000"&gt;http://10.0.0.1:3000&lt;/a&gt;&lt;/em&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Select &lt;strong&gt;Next&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Mup9VaZZ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://www.datawiza.com/wp-content/uploads/2024/03/image6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Mup9VaZZ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://www.datawiza.com/wp-content/uploads/2024/03/image6.png" alt="" width="800" height="395"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  IdP Configuration
&lt;/h3&gt;

&lt;p&gt;DCMC provides an innovative one-click integration to help you complete the Microsoft Entra ID configuration. This is the easiest way to install Microsoft Entra ID. DCMC will automatically complete the configuration for you. With one-click integration, you no longer have to fill out the tedious configuration on Microsoft Entra ID or copy the configuration to DCMC. DCMC calls the Graph API to do all the work for you. In this way, management costs are reduced and configuration errors are less likely to happen, ensuring smooth configuration to a large extent.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--U9EzVbrv--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://www.datawiza.com/wp-content/uploads/2024/03/image3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--U9EzVbrv--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://www.datawiza.com/wp-content/uploads/2024/03/image3.png" alt="" width="800" height="396"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Deploy DAP
&lt;/h3&gt;

&lt;p&gt;Once clicking on the &lt;strong&gt;Create&lt;/strong&gt; button, the basic configuration on the management console is finished. You will see the final step of the guide, which presents you with a page showing the simple steps to deploy DAP with your application.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--4k9lim19--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://www.datawiza.com/wp-content/uploads/2024/03/image5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--4k9lim19--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://www.datawiza.com/wp-content/uploads/2024/03/image5.png" alt="" width="800" height="589"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Enable MFA on Microsoft Entra ID
&lt;/h3&gt;

&lt;p&gt;To provide an extra level of security for sign-ins, you can enforce MFA for user sign-in. There are several ways to achieve this. The simplest and easiest way is to enable MFA on the Azure portal.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Sign in to the Azure portal as a Global Administrator.&lt;/li&gt;
&lt;li&gt;Select &lt;strong&gt;Microsoft Entra ID&lt;/strong&gt; &amp;gt; &lt;strong&gt;Manage&lt;/strong&gt; &amp;gt; &lt;strong&gt;Properties&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Under &lt;strong&gt;Properties&lt;/strong&gt; , click the &lt;strong&gt;Manage security defaults&lt;/strong&gt;. &lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--IDYeXUzk--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://www.datawiza.com/wp-content/uploads/2024/03/image1.png" alt="" width="800" height="395"&gt;
&lt;/li&gt;
&lt;li&gt;Under Enable Security defaults, select &lt;strong&gt;Yes&lt;/strong&gt; and then &lt;strong&gt;Save&lt;/strong&gt;. &lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Connect With Datawiza
&lt;/h2&gt;

&lt;p&gt;Interested in setting up your own Private ChatGPT instance? We’re here to help. &lt;a href="https://www.datawiza.com/contact-us/"&gt;Contact us at Datawiza&lt;/a&gt;, and our team of experts will assist you in transforming your AI landscape. Or &lt;a href="https://calendly.com/datawiza/30min"&gt;book a technical demo&lt;/a&gt; with us.&lt;/p&gt;

&lt;p&gt;The post &lt;a href="https://www.datawiza.com/blog/technical/how-to-set-up-a-private-chatgpt-instance-with-sso-and-mfa/"&gt;How to Set Up a Private ChatGPT Instance with SSO and MFA&lt;/a&gt; appeared first on &lt;a href="https://www.datawiza.com"&gt;Datawiza&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>blog</category>
      <category>technical</category>
    </item>
    <item>
      <title>Extend Microsoft Entra MFA to Your Internal Apps in Minutes</title>
      <dc:creator>Canming Jiang</dc:creator>
      <pubDate>Thu, 29 Feb 2024 21:37:37 +0000</pubDate>
      <link>https://dev.to/cjddww/extend-microsoft-entra-mfa-to-your-internal-apps-in-minutes-2i9o</link>
      <guid>https://dev.to/cjddww/extend-microsoft-entra-mfa-to-your-internal-apps-in-minutes-2i9o</guid>
      <description>&lt;p&gt;Today, the technology landscape is a battleground, and security is the most powerful weapon. With heightened compliance, audit necessities, and the pressing demand for fortified security, multi-factor authentication (MFA) has emerged as a crucial defense. However, traditional legacy authentication schemes lack fluency in modern single sign-on (SSO) protocols such as SAML or OIDC, creating a challenge when integrating Microsoft Entra MFA. The solution lies in the prowess of the Datawiza Access Proxy, capable of swiftly coordinating Microsoft Entra MFA with your internal apps.&lt;/p&gt;

&lt;h2&gt;
  
  
  Grappling with the Legacy Authentication Conundrum
&lt;/h2&gt;

&lt;p&gt;Legacy authentication protocols are like an old-acquaintance; reliable, but unable to keep pace with modern advancements. This poses a challenge when introducing cutting-edge MFA systems and catering to modern corporate applications’ high-security requirements. But worry not, for Datawiza Access Proxy is designed to obliterate these hurdles.&lt;/p&gt;

&lt;h2&gt;
  
  
  Decoding Modern Security with Datawiza Access Proxy
&lt;/h2&gt;

&lt;p&gt;Datawiza Access Proxy steps in as a proficient mediator between your internal apps and Microsoft Entra. Acting as an interlocutor, it deciphers and declares the language of modern SSO protocols smoothly, bringing onboard Microsoft Entra MFA for your apps in a jiffy. For businesses still relying on legacy authentication protocols, Datawiza Access Proxy is a fast track to compliance and enhanced security. It’s not just a solution – it’s the future.&lt;/p&gt;

&lt;h2&gt;
  
  
  Leapfrog to Security Excellence with Datawiza Access Proxy
&lt;/h2&gt;

&lt;p&gt;When you incorporate Datawiza Access Proxy for your internal apps, expect more than just the extension of Microsoft Entra MFA. You’ll be unleashing a slew of benefits:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Rapid MFA Integration:&lt;/strong&gt; Hook up your internal apps with Microsoft Entra MFA in record time, thanks to Datawiza Access Proxy.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Effortless Integration:&lt;/strong&gt; Achieve compliance and security goals effortlessly as Datawiza Access Proxy bridges the gap between your internal apps and Microsoft Entra.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Fortified Security:&lt;/strong&gt; Turbocharge your applications’ defenses by leveraging the advanced protection offered by Microsoft Entra like MFA, Conditional Access and others.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Simplified Operations:&lt;/strong&gt;  Bid goodbye to the complexity of working with various SSO and MFA protocols. Datawiza Access Proxy makes it easy as pie.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Datawiza Access Proxy is akin to having a switch that empowers your journey to digital security and compliance. It’s more than just extending Microsoft Entra MFA for your internal apps; it’s about settling only for the best.&lt;/p&gt;

&lt;h2&gt;
  
  
  How Datawiza Enables Microsoft Entra MFA for Internal Apps
&lt;/h2&gt;

&lt;p&gt;Navigating smoothly between legacy and modern SSO protocols, the Datawiza Access Proxy (DAP) enhances your internal apps’ security. Here’s a distilled view of the process:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Access Request:&lt;/strong&gt;  Users attempt to access your app via the Datawiza Access Proxy (DAP).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Multi-Factor Authentication:&lt;/strong&gt; DAP redirects them to Microsoft Entra ID for login, facilitating the MFA process.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Final Redirection:&lt;/strong&gt; After successful verification with Microsoft Entra, DAP performs extra conditional access checks. Once all checks are passed, DAP proxies the traffic to the internal apps for user access.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Simply put, Datawiza Access Proxy enables your legacy systems to fluently speak modern security protocols, providing robust protection for your enterprise. See the diagram below for your references.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--y0_k1wuL--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://www.datawiza.com/wp-content/uploads/2024/02/entra-mfa-internal-apps.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--y0_k1wuL--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://www.datawiza.com/wp-content/uploads/2024/02/entra-mfa-internal-apps.png" alt="entra-mfa-internal-apps" width="800" height="422"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Datawiza Access Proxy in Action
&lt;/h2&gt;

&lt;p&gt;See the magic as it unfolds with a demo video, showcasing the real-time operation of the Datawiza Access Proxy as it fosters seamless collaboration between your internal applications and Microsoft Entra MFA.&lt;/p&gt;

&lt;p&gt;This walk-through manifests how effortlessly efficient Datawiza Access Proxy can be, transforming your internal applications into modern, secure systems adhering to advanced compliance and validation metrics. Get ready to explore a world of security, forged by Datawiza.&lt;/p&gt;

&lt;p&gt;The post &lt;a href="https://www.datawiza.com/blog/industry/extend-microsoft-entra-mfa-to-your-internal-apps-in-minutes/"&gt;Extend Microsoft Entra MFA to Your Internal Apps in Minutes&lt;/a&gt; appeared first on &lt;a href="https://www.datawiza.com"&gt;Datawiza&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>blog</category>
      <category>industry</category>
    </item>
    <item>
      <title>Unveiling the 6 Risks of Not Integrating Your Legacy Apps with Microsoft Entra ID SSO</title>
      <dc:creator>Canming Jiang</dc:creator>
      <pubDate>Mon, 19 Feb 2024 18:10:23 +0000</pubDate>
      <link>https://dev.to/cjddww/unveiling-the-6-risks-of-not-integrating-your-legacy-apps-with-microsoft-entra-id-sso-41k4</link>
      <guid>https://dev.to/cjddww/unveiling-the-6-risks-of-not-integrating-your-legacy-apps-with-microsoft-entra-id-sso-41k4</guid>
      <description>&lt;p&gt;In today’s technologically enhanced business landscape, enterprises employ a gamut of modern and legacy applications to power their operations. The onset of cloud technology has ushered organizations towards state-of-the-art applications. Yet, legacy applications, often the crown jewels of a company’s IT estate, hold a unique and critical value. These time-tested warriors – whether it’s a homegrown application,  a CRM system or a ERP system offered by 3-rd party, – house copious amounts of valuable data and facilitate crucial business operations.&lt;/p&gt;

&lt;p&gt;Yet, integrating these stalwarts with Single Sign-On (SSO) services like Microsoft Entra ID isn’t a luxury – it’s a necessity that is all too often neglected. Opting out of Enterprise SSO integration for your legacy apps inadvertently exposes your organization to several significant risks. Let’s unveil the six major perils when your legacy apps sidestep connection with Microsoft Entra ID (formally Azure AD) SSO.&lt;/p&gt;

&lt;h2&gt;
  
  
  Risk 1: Increased Security Risks
&lt;/h2&gt;

&lt;p&gt;A security risk often underestimated resides in legacy systems protected solely by traditional username and password methods. Regardless of these apps being accessed strictly within a corporate network or via VPN, they become easy targets for cyber-attacks. The fortification granted by SSO integration bolsters their security multifold, with advanced protection like Multi-Factor Authentication (MFA) and conditional access.&lt;/p&gt;

&lt;h2&gt;
  
  
  Risk 2: Compliance Issues
&lt;/h2&gt;

&lt;p&gt;Navigating compliance, audit, and cyber insurance requirements without contemporary authentication methods like MFA and conditional access can lead to stifling roadblocks. Operating legacy apps without these safeguards and lacking a seamless process for user provisioning and deprovisioning can spark compliance complexities and undermine audit rigour.&lt;/p&gt;

&lt;h2&gt;
  
  
  Risk 3: Wasted Investment
&lt;/h2&gt;

&lt;p&gt;Consider the expense of SSO, MFA, and conditional access based on per-user pricing models. Now, imagine not applying these top-tier features to your legacy apps – it’s equivalent to underutilizing valuable resources you’ve already invested in. Activate the full potential of your investment by reinforcing legacy apps with Entra ID SSO, optimizing every feature you’ve funded.&lt;/p&gt;

&lt;h2&gt;
  
  
  Risk 4: Increased IT Costs
&lt;/h2&gt;

&lt;p&gt;Traditional authentication leads to substantial IT support needs, addressing user access issues, password resets and other administrative tasks. Without SSO, these costs escalate quickly, negatively affecting the overall operational efficiency. SSO adoption results in substantial cost savings by automating and simplifying these processes.&lt;/p&gt;

&lt;h2&gt;
  
  
  Risk 5: Difficulty in Access Management
&lt;/h2&gt;

&lt;p&gt;The absence of an SSO integration turns user access management within each legacy application into a cumbersome task. SSO is not just about convenience – it’s about redeploying IT effort where it truly adds value to your organization.&lt;/p&gt;

&lt;h2&gt;
  
  
  Risk 6:  Decreased Productivity
&lt;/h2&gt;

&lt;p&gt;Juggling multiple login credentials often sees employees wasting valuable work time resetting forgotten passwords or locked accounts. With SSO adoption, employees can channel their efforts into their primary tasks, boosting organizational productivity.&lt;/p&gt;

&lt;p&gt;Integrating legacy applications with Microsoft Entra ID SSO is not just modernization. It’s a strategic move with tangible benefits such as improved security, increased productivity, streamlined compliance, and optimized investments.&lt;/p&gt;

&lt;p&gt;Don’t limit Microsoft Entra ID SSO to only your modern SaaS applications. Embrace it for your legacy applications, too, to chart a path towards a secure, streamlined, and financially astute future.&lt;/p&gt;

&lt;h2&gt;
  
  
  Reach Out to Us
&lt;/h2&gt;

&lt;p&gt;Interested in learning more about how Datawiza helps integrating Microsoft Entra ID with your legacy applications?  &lt;a href="https://www.datawiza.com/contact-us/"&gt;Get in touch with us&lt;/a&gt; or &lt;a href="https://calendly.com/datawiza/30min"&gt;book a technical demo&lt;/a&gt; to gain firsthand insight.&lt;/p&gt;

&lt;p&gt;The post &lt;a href="https://www.datawiza.com/blog/industry/unveiling-the-6-risks-of-not-integrating-your-legacy-apps-with-microsoft-entra-id-sso/"&gt;Unveiling the 6 Risks of Not Integrating Your Legacy Apps with Microsoft Entra ID SSO&lt;/a&gt; appeared first on &lt;a href="https://www.datawiza.com"&gt;Datawiza&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>blog</category>
      <category>industry</category>
    </item>
    <item>
      <title>Modernizing Authentication for Enterprise Applications</title>
      <dc:creator>Canming Jiang</dc:creator>
      <pubDate>Fri, 19 Jan 2024 00:03:17 +0000</pubDate>
      <link>https://dev.to/cjddww/modernizing-authentication-for-enterprise-applications-596n</link>
      <guid>https://dev.to/cjddww/modernizing-authentication-for-enterprise-applications-596n</guid>
      <description>&lt;p&gt;In an era filled with data breaches and cyber threats, enterprise application security has never been more critical. Unfortunately, many applications still hold onto legacy authentication methods, which lack both adequate security measures and user-friendliness. With the evident urgency to shift towards secure authentication methods, modernizing has become the need of the hour.&lt;/p&gt;

&lt;h2&gt;
  
  
  Embracing Modern Authentication Technologies
&lt;/h2&gt;

&lt;p&gt;The world is witnessing a much-needed shift towards innovative, modern authentication technologies that bolster security and improve the user experience. These technologies are shaping the future of enterprise application security.&lt;/p&gt;

&lt;h3&gt;
  
  
  Single Sign-On (SSO)
&lt;/h3&gt;

&lt;p&gt;This user-friendly solution allows individuals to access multiple applications using the same set of credentials. With SSO, user experiences are simplified, reducing the risk of security breaches due to forgotten passwords.&lt;/p&gt;

&lt;h3&gt;
  
  
  Multi-Factor Authentication (MFA)
&lt;/h3&gt;

&lt;p&gt;MFA boosts security by requiring users to provide at least two forms of valid identification. With MFA, enterprises can heighten their defense, ensuring that a compromise of one level of security doesn’t put the entire system at risk.&lt;/p&gt;

&lt;h3&gt;
  
  
  Passwordless
&lt;/h3&gt;

&lt;p&gt;Passwordless technology, being lauded as the future of secure authentication, ditches passwords entirely. By using biometrics, hardware tokens, or one-time PINs for validation, this technology offers a secure, user-friendly system.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Roadblocks to Modernization: Upgrading Legacy Systems
&lt;/h2&gt;

&lt;p&gt;While the need to switch to modern authentication methods is evident, the transition comes with significant challenges.&lt;/p&gt;

&lt;h3&gt;
  
  
  Modernizing Homegrown LoB Applications
&lt;/h3&gt;

&lt;p&gt;Homegrown Line of Business (LoB) applications, especially those developed over a decade ago, become a considerable bottleneck in the modernization process. Modernizing these applications to incorporate secure authentication methods could span over several months per application.&lt;/p&gt;

&lt;h3&gt;
  
  
  Constraints of Off-the-Shelf Applications
&lt;/h3&gt;

&lt;p&gt;For businesses using off-the-shelf applications like Oracle PeopleSoft, EBS, JDE, Siebel, the freedom to revise and upgrade the authentication mechanisms is limited. The original codification of these systems doesn’t usually support security advancements, leaving enterprises grappling with outdated security measures.&lt;/p&gt;

&lt;h3&gt;
  
  
  Disruptions to Operational Continuity
&lt;/h3&gt;

&lt;p&gt;A major concern while transitioning from legacy systems to more secure authentication methods is the potential disruption to operational continuity. Attempts to integrate modern authentication technologies carry a risk of affecting the application’s core functions. Even minor glitches can interrupt business operations, leading to increased downtime, loss of productivity, and potential revenue losses.&lt;/p&gt;

&lt;h2&gt;
  
  
  Accelerating Toward Modern Authentication
&lt;/h2&gt;

&lt;p&gt;Modernizing authentication methods for enterprise applications indeed pose meaningful challenges. Nonetheless, the advent of modern authentication technologies like SSO, MFA, and Passwordless make this endeavor crucial. These technologies promise improved security, a seamless user experience, and enhanced operational efficiency, valuable assets in today’s increasingly digital age.&lt;/p&gt;

&lt;p&gt;Despite the hurdles that lie between enterprises and modern authentication, the landscape is rapidly changing. With innovative solutions emerging, like the &lt;a href="https://www.datawiza.com/platform/"&gt;Datawiza No-Code Platform&lt;/a&gt;, we are already experiencing an acceleration in the pace of authentication modernization. Consequently, adopting such advancements is not just an option—it’s an imperative strategy for securing applications and data.&lt;/p&gt;

&lt;p&gt;The journey towards modern authentication might appear daunting initially, but the destination offers greater security and peace of mind. So, as we step into a future ripe with potential, the accelerating pace of modernization brings renewed hope for businesses navigating the complex landscape of enterprise application security.&lt;/p&gt;

&lt;p&gt;The post &lt;a href="https://www.datawiza.com/blog/industry/modernizing-authentication-for-enterprise-applications/"&gt;Modernizing Authentication for Enterprise Applications&lt;/a&gt; appeared first on &lt;a href="https://www.datawiza.com"&gt;Datawiza&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>blog</category>
      <category>industry</category>
    </item>
    <item>
      <title>Solution Overview: Migrating Header-Based Apps from Broadcom SiteMinder to Ping Identity</title>
      <dc:creator>Canming Jiang</dc:creator>
      <pubDate>Thu, 21 Dec 2023 20:07:00 +0000</pubDate>
      <link>https://dev.to/cjddww/solution-overview-migrating-header-based-apps-from-broadcom-siteminder-to-ping-identity-43d7</link>
      <guid>https://dev.to/cjddww/solution-overview-migrating-header-based-apps-from-broadcom-siteminder-to-ping-identity-43d7</guid>
      <description>&lt;p&gt;Transitioning legacy or on-premises applications that utilize &lt;a href="https://www.datawiza.com/blog/decoding-header-based-authentication-a-key-to-secure-web-access-management"&gt;header-based authentication&lt;/a&gt; from Broadcom SiteMinder to Ping Identity (PingOne) can pose a challenge, given their lack of support for modern SSO protocols like OIDC or SAML. Datawiza Access Proxy effectively bridges this gap by extending OIDC or SAML functionality to these header-based applications, facilitating a seamless migration from Broadcom SiteMinder to Ping Identity (PingOne).&lt;/p&gt;

&lt;h2&gt;
  
  
  How Datawiza Migrates Header-Based Apps from SiteMinder To Ping
&lt;/h2&gt;

&lt;p&gt;Datawiza, integrating with Ping Identity via OpenID Connect (OIDC) or SAML, provides a robust alternative to Broadcom’s SiteMinder. Delivering comprehensive capabilities like Single Sign-On (SSO), Multi-Factor Authentication (MFA), and granular access control, this solution supports legacy web app authentication mechanisms, such as Kerberos, IWA, Header-Based authentication, and realms (URL authorizations).&lt;/p&gt;

&lt;p&gt;The Datawiza Access Proxy replaces SiteMinder without necessitating application rewrites. Plus, our deployment model eliminates additional middleware or database servers. Excelling in flexibility, Datawiza supports not only virtual machines, but also modern platforms like Docker Containers and Kubernetes.&lt;/p&gt;

&lt;p&gt;The following diagram gives a detailed overview.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--0Xi4RCvN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://www.datawiza.com/wp-content/uploads/2023/12/ping-siteminder-migration.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--0Xi4RCvN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://www.datawiza.com/wp-content/uploads/2023/12/ping-siteminder-migration.png" alt="migrate apps from ca siteminder to ping" width="800" height="434"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;The user starts the web application access process.&lt;/li&gt;
&lt;li&gt;Datawiza Access Proxy steps in, directing unauthenticated users towards Ping Identity for federated authentication – an action akin to procedures handled by SiteMinder Gateway, App Server, or Web Agents.&lt;/li&gt;
&lt;li&gt;Ping Identity uses cloud-based identity functions to verify the user, utilizing Single Sign-On, MFA, and Federation.&lt;/li&gt;
&lt;li&gt;Users are then guided back to Datawiza Access Proxy, which sets up the session, authorizes URL access, and transfers user information to the enterprise app via methods such as Header-Based Authentication or IWA/Kerberos.&lt;/li&gt;
&lt;li&gt;The enterprise application processes the relayed user information and responds appropriately.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Why Choose Datawiza for SiteMinder Migration?
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Rapid and Easy Migration:&lt;/strong&gt; We stand ready to migrate hundreds of apps from SiteMinder to Ping Identity swiftly and efficiently – accomplishing the task within just days, to ensure a hassle-free experience.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Modern and Cloud-Native Design:&lt;/strong&gt;  The solution goes beyond mere VM (Virtual Machine) support, integrating effortlessly with Containers and Kubernetes. It also eliminates the need for extra middleware or database servers, ensuring a streamlined, modern infrastructure.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Avoiding identity-vendor-lock-in:&lt;/strong&gt; Future-proof your operations with our broad support for modern identities. Alongside Ping Identity, we accommodate popular platforms including Okta, Microsoft Entra ID, Cisco Duo, and others, providing a comprehensive solution against vendor lock-in.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Get In Touch With Us
&lt;/h2&gt;

&lt;p&gt;Eager for more information? Feel free to &lt;a href="https://www.datawiza.com/contact-us/"&gt;get in touch with us&lt;/a&gt; or &lt;a href="https://calendly.com/datawiza/30min"&gt;book a demo&lt;/a&gt; to gain firsthand insight into how we can help seamlessly migrate apps from SiteMinder to Ping Identity.&lt;/p&gt;

&lt;p&gt;The post &lt;a href="https://www.datawiza.com/blog/industry/solution-overview-migrating-header-based-apps-from-broadcom-siteminder-to-ping-identity/"&gt;Solution Overview: Migrating Header-Based Apps from Broadcom SiteMinder to Ping Identity&lt;/a&gt; appeared first on &lt;a href="https://www.datawiza.com"&gt;Datawiza&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>blog</category>
      <category>industry</category>
    </item>
    <item>
      <title>Streamline Identity Provider (IdP) Migration With Datawiza</title>
      <dc:creator>Canming Jiang</dc:creator>
      <pubDate>Thu, 21 Dec 2023 01:00:46 +0000</pubDate>
      <link>https://dev.to/cjddww/streamline-identity-provider-idp-migration-with-datawiza-24ck</link>
      <guid>https://dev.to/cjddww/streamline-identity-provider-idp-migration-with-datawiza-24ck</guid>
      <description>&lt;p&gt;With a wide variety of established identity providers gracing the market such as Microsoft Entra ID (Azure AD), Ping Identity (PingOne, now merged with ForgeRock), Okta, Cisco Duo, Google Workspace, Amazon Cognito, CA SiteMinder, NetIQ, RSA, IBM, Oracle, ADFS and others, there is ample room to choose the best fitting option. However, in the navigation of this complex landscape, enterprises often find themselves needing to switch between these identity providers, be it a switch from Okta to Microsoft Entra ID or vice versa.&lt;/p&gt;

&lt;p&gt;Migrating modern applications from one Identity provider to another is typically a straightforward process, as these applications generally support protocols such as SAML 2.0 or OIDC. The real difficulty arises when dealing with legacy or on-premises applications that lack this native support, e.g., header-based authentication, Kerberos or custom-built authentication. But worry not, as &lt;a href="https://www.datawiza.com/platform/"&gt;Datawiza&lt;/a&gt; presents a streamlined, seamless and efficient solution that simplifies the migration process.&lt;/p&gt;

&lt;h2&gt;
  
  
  Container-based Proxy to Extend OIDC or SAML Protocol to Legacy Applications
&lt;/h2&gt;

&lt;p&gt;Datawiza’s container-based proxy serves as a bridge between your legacy applications and modern authentication protocols, extending OIDC or SAML support to applications that previously lacked it. By integrating this proxy, legacy applications gain the ability to authenticate users through these protocols, remarkably simplifying the migration process. Regardless of where your application resides, be it in an on-premises environment or in a private or public cloud, the proxy enables smooth transition, saving you valuable time and resources.&lt;/p&gt;

&lt;h2&gt;
  
  
  Multiple Identity Provider Support Avoids Downtime and Prevents Vendor Lock-in
&lt;/h2&gt;

&lt;p&gt;One of the biggest advantages of Datawiza’s solution is its compatibility with multiple identity providers. This multi-IdP support not only allows your business to avoid vendor lock-in, but also minimizes potential downtime during the migration process. By offering a breadth of supported IdPs and seamless switching capacity, your business can ensure continuity of services while transitioning to a different provider. Ultimately, you gain the flexibility to select the IdP that best fits your business requirements at any point in time, without worrying about potential roadblocks. See the screenshot below for your reference.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--SPlNa2Pb--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://www.datawiza.com/wp-content/uploads/2023/12/datawiza-multiple-idp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--SPlNa2Pb--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://www.datawiza.com/wp-content/uploads/2023/12/datawiza-multiple-idp.png" alt="datawiza supports multiple identity providers" width="800" height="459"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Cloud Management Console Makes Multi-Cloud Environments Deployments Much Easier
&lt;/h2&gt;

&lt;p&gt;In an era where multi-cloud environments are becoming the norm, managing deployments across these platforms can be a daunting task. &lt;a href="https://console.datawiza.com"&gt;Datawiza’s cloud management console&lt;/a&gt; comes to the rescue by enabling easy orchestration of deployments across various cloud environments. Whether you’re operating in AWS, Azure, Google Cloud, or on-premises, the console provides a unified dashboard that simplifies the management of application deployments. By leveraging Datawiza, you can streamline your multi-cloud deployments, enhancing efficiency and reducing the operational burden.&lt;/p&gt;

&lt;p&gt;In essence, with Datawiza’’s broad suite of capabilities, you can say goodbye to the challenges tied to Identity Provider migration. Take the leap today and experience a smoother, less complicated and more flexible migration journey.&lt;/p&gt;

&lt;h2&gt;
  
  
  Reach Out To Us
&lt;/h2&gt;

&lt;p&gt;Upgrade your Identity Provider migration process with Datawiza. Connect with our team of experts through the &lt;a href="https://www.datawiza.com/contact-us/"&gt;Contact Us&lt;/a&gt; page or email us at &lt;a href="mailto:contact@datawiza.com"&gt;contact@datawiza.com&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;The post &lt;a href="https://www.datawiza.com/blog/industry/streamline-identity-provider-idp-migration-with-datawiza/"&gt;Streamline Identity Provider (IdP) Migration With Datawiza&lt;/a&gt; appeared first on &lt;a href="https://www.datawiza.com"&gt;Datawiza&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>blog</category>
      <category>industry</category>
    </item>
    <item>
      <title>Solution Overview: Migrating Header-Based Apps from Okta to Microsoft Entra ID</title>
      <dc:creator>Canming Jiang</dc:creator>
      <pubDate>Wed, 20 Dec 2023 21:23:32 +0000</pubDate>
      <link>https://dev.to/cjddww/solution-overview-migrating-header-based-apps-from-okta-to-microsoft-entra-id-35ia</link>
      <guid>https://dev.to/cjddww/solution-overview-migrating-header-based-apps-from-okta-to-microsoft-entra-id-35ia</guid>
      <description>&lt;p&gt;Migrating modern apps from Okta to Microsoft Entra ID (Azure AD) is a straightforward process, provided they support SAML 2.0 or OIDC. Conversely, legacy or on-premises applications that employ &lt;a href="https://www.datawiza.com/blog/decoding-header-based-authentication-a-key-to-secure-web-access-management"&gt;header-based authentication&lt;/a&gt; present a more significant challenge. Typically, these apps interface with Okta Single Sign-On and leverage multi-factor authentication through Okta Access Gateway and do not natively support SAML 2.0 or OIDC. Direct migration to Microsoft Entra ID can therefore prove difficult. However, &lt;a href="https://www.datawiza.com/add-sso-to-legacy-apps-and-on-premises-apps-without-modifying-source-code/"&gt;a seamless and expeditious solution is offered by Datawiza&lt;/a&gt;, simplifying this transition.&lt;/p&gt;

&lt;h2&gt;
  
  
  Microsoft-Certified Solution for Migrating from Okta to Entra ID
&lt;/h2&gt;

&lt;p&gt;Datawiza facilitates a seamless migration of legacy or on-premise applications from Okta (Okta Access Gateway) to Microsoft Entra ID (Azure AD), eliminating the need for application code modifications. These applications primarily support legacy authentications such as header-based authentication, or cookie-based authentication or Kerberos.&lt;/p&gt;

&lt;p&gt;Learn more about the comprehensive range of features and advantages provided by our solution on the Azure Marketplace.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://azuremarketplace.microsoft.com/en-us/marketplace/apps/datawiza1599763715312.datawiza?tab=overview"&gt;Discover Datawiza Platform on Azure Marketplace&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Also, access our joint tutorial developed with Microsoft for a step-by-step guide.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://learn.microsoft.com/en-us/azure/active-directory/manage-apps/datawiza-configure-sha"&gt;Tutorial: Configure Datawiza to Integrate Header-based Apps with Microsoft Entra ID&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Explore the Following Demo for a Hands-on Experience
&lt;/h2&gt;

&lt;h2&gt;
  
  
  How Datawiza Facilitates App Migration from Okta to Microsoft Entra ID
&lt;/h2&gt;

&lt;p&gt;In collaboration with Microsoft Entra ID, Datawiza supplants Okta by presenting a unified solution that incorporates Single Sign-On (SSO), Multi-factor authentication (MFA), and nuanced access control for web applications. Our proprietary solution, Datawiza Access Proxy, seamlessly supports widely recognized legacy web app integration methods, including Kerberos, IWA, Header-Based authentication, and realms (URL authorization). This eliminates the need for Okta Access Gateway and nuanced application rewrites. Furthermore, Datawiza’s deployment model is efficient, eliminating the need for extra middleware or database servers, and not just supporting virtual machines, but also cutting-edge platforms like Docker Containers and Kubernetes.&lt;/p&gt;

&lt;p&gt;The schematic representation below explains the process:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s---kU2YnaM--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://www.datawiza.com/wp-content/uploads/2023/12/oag-to-dap.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s---kU2YnaM--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://www.datawiza.com/wp-content/uploads/2023/12/oag-to-dap.png" alt="migrate apps from okta to Microsoft Entra id" width="800" height="411"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;User initiates web application access.&lt;/li&gt;
&lt;li&gt;The Datawiza Access Proxy intercepts, redirecting unauthenticated users to Microsoft Entra ID for federated authentication, similar to actions by Okta Access Gateway.&lt;/li&gt;
&lt;li&gt;Microsoft Entra ID employs cloud identity functions to authenticate the user – Passwordless, Single Sign-On, and MFA.&lt;/li&gt;
&lt;li&gt;Users are rerouted back to Datawiza Access Proxy to set up the session, authorize URL access, and forward user information to the enterprise app via authentication mechanisms like Header-Based Authentication or IWA/Kerberos.&lt;/li&gt;
&lt;li&gt;The enterprise app processes the user information and responds accordingly.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Why Choose Datawiza for Header-Based App Migration?
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Rapid and Easy Migration:&lt;/strong&gt; We stand ready to migrate hundreds of apps from Okta to Microsoft Entra ID (Azure AD) swiftly and efficiently – accomplishing the task within just days, to ensure a hassle-free experience.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Modern and Cloud-Native Design:&lt;/strong&gt;  The solution goes beyond mere VM (Virtual Machine) support, integrating effortlessly with Containers and Kubernetes. It also eliminates the need for extra middleware or database servers, ensuring a streamlined, modern infrastructure.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Avoiding identity-vendor-lock-in:&lt;/strong&gt; Future-proof your operations with our broad support for modern identities. Alongside Microsoft Entra ID, we accommodate popular platforms including Cisco Duo, PingOne, ForgeRock, and others, providing a comprehensive solution against vendor lock-in.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Contact Us
&lt;/h2&gt;

&lt;p&gt;Eager for more information? Feel free to &lt;a href="https://www.datawiza.com/contact-us/"&gt;get in touch with us&lt;/a&gt; or &lt;a href="https://calendly.com/datawiza/30min"&gt;book a demo&lt;/a&gt; to gain firsthand insight into how we can help seamlessly migrate apps from Okta to Microsoft Entra ID (Azure AD).&lt;/p&gt;

&lt;p&gt;The post &lt;a href="https://www.datawiza.com/blog/industry/migrating-header-based-apps-from-okta-to-microsoft-entra-id/"&gt;Solution Overview: Migrating Header-Based Apps from Okta to Microsoft Entra ID&lt;/a&gt; appeared first on &lt;a href="https://www.datawiza.com"&gt;Datawiza&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>blog</category>
      <category>industry</category>
    </item>
    <item>
      <title>Solution Overview: Migrating Legacy or On-prem Apps from Okta to Microsoft Entra ID</title>
      <dc:creator>Canming Jiang</dc:creator>
      <pubDate>Wed, 20 Dec 2023 21:23:32 +0000</pubDate>
      <link>https://dev.to/cjddww/solution-overview-migrating-legacy-or-on-prem-apps-from-okta-to-microsoft-entra-id-587j</link>
      <guid>https://dev.to/cjddww/solution-overview-migrating-legacy-or-on-prem-apps-from-okta-to-microsoft-entra-id-587j</guid>
      <description>&lt;p&gt;Migrating modern apps from Okta to Microsoft Entra ID (Azure AD) is a straightforward process, provided they support SAML 2.0 or OIDC. Conversely, legacy or on-premises applications present a more significant challenge. Typically, these apps interface with Okta Single Sign-On and leverage multi-factor authentication through Okta Access Gateway and do not natively support SAML 2.0 or OIDC. Direct migration to Microsoft Entra ID can therefore prove difficult. However, &lt;a href="https://www.datawiza.com/add-sso-to-legacy-apps-and-on-premises-apps-without-modifying-source-code/"&gt;a seamless and expeditious solution is offered by Datawiza&lt;/a&gt;, simplifying this transition.&lt;/p&gt;

&lt;h2&gt;
  
  
  Microsoft-Certified Solution for Migrating from Okta to Entra ID
&lt;/h2&gt;

&lt;p&gt;Datawiza facilitates a seamless migration of legacy or on-premise applications from Okta (Okta Access Gateway) to Microsoft Entra ID (Azure AD), eliminating the need for application code modifications. These applications primarily support legacy authentications such as header-based authentication, or cookie-based authentication or Kerberos.&lt;/p&gt;

&lt;p&gt;Learn more about the comprehensive range of features and advantages provided by our solution on the Azure Marketplace.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://azuremarketplace.microsoft.com/en-us/marketplace/apps/datawiza1599763715312.datawiza?tab=overview"&gt;Discover Datawiza Platform on Azure Marketplace&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Also, access our joint tutorial developed with Microsoft for a step-by-step guide.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://learn.microsoft.com/en-us/azure/active-directory/manage-apps/datawiza-configure-sha"&gt;Tutorial: Configure Datawiza to Integrate Header-based Apps with Microsoft Entra ID&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Explore the Following Demo for a Hands-on Experience
&lt;/h2&gt;

&lt;h2&gt;
  
  
  How Datawiza Facilitates App Migration from Okta to Microsoft Entra ID
&lt;/h2&gt;

&lt;p&gt;In collaboration with Microsoft Entra ID, Datawiza supplants Okta by presenting a unified solution that incorporates Single Sign-On (SSO), Multi-factor authentication (MFA), and nuanced access control for web applications. Our proprietary solution, Datawiza Access Proxy, seamlessly supports widely recognized legacy web app integration methods, including Kerberos, IWA, Header-Based authentication, and realms (URL authorization). This eliminates the need for Okta Access Gateway and nuanced application rewrites. Furthermore, Datawiza’s deployment model is efficient, eliminating the need for extra middleware or database servers, and not just supporting virtual machines, but also cutting-edge platforms like Docker Containers and Kubernetes.&lt;/p&gt;

&lt;p&gt;The schematic representation below explains the process:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s---kU2YnaM--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://www.datawiza.com/wp-content/uploads/2023/12/oag-to-dap.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s---kU2YnaM--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://www.datawiza.com/wp-content/uploads/2023/12/oag-to-dap.png" alt="migrate apps from okta to Microsoft Entra id" width="800" height="411"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;User initiates web application access.&lt;/li&gt;
&lt;li&gt;The Datawiza Access Proxy intercepts, redirecting unauthenticated users to Microsoft Entra ID for federated authentication, similar to actions by Okta Access Gateway.&lt;/li&gt;
&lt;li&gt;Microsoft Entra ID employs cloud identity functions to authenticate the user – Passwordless, Single Sign-On, and MFA.&lt;/li&gt;
&lt;li&gt;Users are rerouted back to Datawiza Access Proxy to set up the session, authorize URL access, and forward user information to the enterprise app via authentication mechanisms like Header-Based Authentication or IWA/Kerberos.&lt;/li&gt;
&lt;li&gt;The enterprise app processes the user information and responds accordingly.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Why Choose Datawiza for App Migration?
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Rapid and Easy Migration:&lt;/strong&gt; We stand ready to migrate hundreds of apps from Okta to Microsoft Entra ID (Azure AD) swiftly and efficiently – accomplishing the task within just days, to ensure a hassle-free experience.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Modern and Cloud-Native Design:&lt;/strong&gt;  The solution goes beyond mere VM (Virtual Machine) support, integrating effortlessly with Containers and Kubernetes. It also eliminates the need for extra middleware or database servers, ensuring a streamlined, modern infrastructure.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Avoiding identity-vendor-lock-in:&lt;/strong&gt; Future-proof your operations with our broad support for modern identities. Alongside Microsoft Entra ID, we accommodate popular platforms including Cisco Duo, PingOne, ForgeRock, and others, providing a comprehensive solution against vendor lock-in.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Contact Us
&lt;/h2&gt;

&lt;p&gt;Eager for more information? Feel free to &lt;a href="https://www.datawiza.com/contact-us/"&gt;get in touch with us&lt;/a&gt; or &lt;a href="https://calendly.com/datawiza/30min"&gt;book a demo&lt;/a&gt; to gain firsthand insight into how we can help seamlessly migrate apps from Okta to Microsoft Entra ID (Azure AD).&lt;/p&gt;

&lt;p&gt;The post &lt;a href="https://www.datawiza.com/blog/industry/migrating-legacy-or-on-prem-apps-from-okta-to-microsoft-entra-id/"&gt;Solution Overview: Migrating Legacy or On-prem Apps from Okta to Microsoft Entra ID&lt;/a&gt; appeared first on &lt;a href="https://www.datawiza.com"&gt;Datawiza&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>blog</category>
      <category>industry</category>
    </item>
    <item>
      <title>Add Microsoft Entra ID SSO, MFA and Passwordless to Your Apps with the No-Code Datawiza Access Proxy</title>
      <dc:creator>Canming Jiang</dc:creator>
      <pubDate>Fri, 15 Dec 2023 05:34:26 +0000</pubDate>
      <link>https://dev.to/cjddww/add-microsoft-entra-id-sso-mfa-and-passwordless-to-your-apps-with-the-no-code-datawiza-access-proxy-l5k</link>
      <guid>https://dev.to/cjddww/add-microsoft-entra-id-sso-mfa-and-passwordless-to-your-apps-with-the-no-code-datawiza-access-proxy-l5k</guid>
      <description>&lt;p&gt;In an era where user authentication is paramount, yet increasingly intricate, Microsoft Entra ID (Azure AD) Single Sign-On (SSO) stands tall as an advanced solution. At Datawiza, we are committed to distilling this complexity into user-friendly forms. The Datawiza Access Proxy (DAP), our innovative no-code solution, simplifies the Microsoft Entra ID SSO integration, bringing passwordless authentication and Multi-Factor Authentication (MFA) to your doorstep.&lt;/p&gt;

&lt;h2&gt;
  
  
  Navigating the Future with Datawiza Access Proxy
&lt;/h2&gt;

&lt;p&gt;DAP is a technology that empowers businesses to smoothly integrate Microsoft Entra ID (Azure AD) Single Sign-On into their web applications – all without touching a line of code. It bids farewell to cumbersome navigation through &lt;a href="https://learn.microsoft.com/en-us/entra/identity-platform/msal-overview"&gt;MSAL (Microsoft Authentication Library)&lt;/a&gt;SDKs or APIs and ushers in an era of seamless, passwordless SSO integration and enhanced security through MFA.&lt;/p&gt;

&lt;p&gt;DAP serves as a container-based reverse-proxy, stationed ahead of web applications. It integrates seamlessly with Microsoft Entra ID, utilizing either OpenID Connect (OIDC) or Security Assertion Markup Language (SAML), thereby eliminating the necessity for applications to implement these protocols. When users attempt to access the application, they are directed to Microsoft to complete authentication. Post authentication, the traffic is proxy-passed to the original application. For a visual understanding of these operations, refer to the diagram below.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--082Zzbjg--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://www.datawiza.com/wp-content/uploads/2023/12/no-code-entra-id-sso.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--082Zzbjg--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://www.datawiza.com/wp-content/uploads/2023/12/no-code-entra-id-sso.png" alt="no code way to add Microsoft Entra id SSO and MFA" width="800" height="308"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Decoding the No-Code Revolution
&lt;/h2&gt;

&lt;p&gt;The advent of no-code solutions is revolutionizing the tech landscape, making the implementation of complex functionalities accessible to all. DAP facilitates this change: even developers with no prior knowledge of single sign-on can rapidly implement Microsoft Entra ID Single Sign-On (SSO) integration. The need for extensive security knowledge becomes obsolete, paving the way for quick, reliable solutions to authentication.&lt;/p&gt;

&lt;p&gt;DAP symbolizes the future of this field, eradicating traditional hindrances to deliver a democratized, straightforward approach to SSO, facilitating passwordless authentication and multi-factor authentication (MFA).&lt;/p&gt;

&lt;p&gt;For an in-depth, step-by-step guide on integrating Microsoft Entra ID SSO into your applications, refer to the provided tutorial here: &lt;a href="https://docs.datawiza.com/tutorial/web-app-azure.html"&gt;https://docs.datawiza.com/tutorial/web-app-azure.html&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  The Road to Passwordless Authentication and MFA With Microsoft Entra ID SSO and DAP
&lt;/h2&gt;

&lt;p&gt;SSO is a game-changer, magnifying security measures while simultaneously boosting user convenience by avoiding repeated logins. Even better, going passwordless means that users don’t even have to remember password details, making the authentication process smooth and effortless, while MFA ensures an extra layer of security.&lt;/p&gt;

&lt;p&gt;Transitioning to Microsoft SSO traditionally involved wrangling with MSAL SDKs or APIs – but no more. DAP simplifies this journey, enabling you to enjoy the benefits of single sign-on, passwordless authentication, and MFA in a straightforward and efficient manner.&lt;/p&gt;

&lt;h2&gt;
  
  
  Datawiza Access Proxy – Your Trusted Guardian for SSO Integration
&lt;/h2&gt;

&lt;p&gt;DAP is not just a tool – it is your trusted ally in the journey toward seamless, secure SSO integration. Whether you are a small business or a sizable enterprise, DAP fast-tracks you toward effective Microsoft SSO integration. With its cloud compatibility and modern design like container-based proxy, it makes SSO integration an intuitive, reliable process.&lt;/p&gt;

&lt;h2&gt;
  
  
  In Conclusion
&lt;/h2&gt;

&lt;p&gt;Embrace the no-code revolution in SSO integration with the Datawiza Access Proxy. Engage with the trend of passwordless authentication and secure your business further with MFA from Microsoft Entra ID SSO, without the complications of MSAL SDKs or APIs.&lt;/p&gt;

&lt;p&gt;If you are interested in implementing Microsoft Entra ID SSO via a no-code way, &lt;a href="https://www.datawiza.com/contact-us/"&gt;contact us&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;The post &lt;a href="https://www.datawiza.com/blog/industry/add-microsoft-entra-id-sso-mfa-and-passwordless-to-your-apps-with-the-no-code-datawiza-access-proxy/"&gt;Add Microsoft Entra ID SSO, MFA and Passwordless to Your Apps with the No-Code Datawiza Access Proxy&lt;/a&gt; appeared first on &lt;a href="https://www.datawiza.com"&gt;Datawiza&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>blog</category>
      <category>industry</category>
    </item>
    <item>
      <title>Enhancing EHR/EMR Security with MFA/2FA – No Source Code Modification Required</title>
      <dc:creator>Canming Jiang</dc:creator>
      <pubDate>Tue, 12 Dec 2023 01:49:56 +0000</pubDate>
      <link>https://dev.to/cjddww/enhancing-ehremr-security-with-mfa2fa-no-source-code-modification-required-gh3</link>
      <guid>https://dev.to/cjddww/enhancing-ehremr-security-with-mfa2fa-no-source-code-modification-required-gh3</guid>
      <description>&lt;p&gt;In the digital era of healthcare where EHR (Electronic Health Records) and EMR (Electronic Medical Records) have become integral, the significance of EHR or EMR Security Solutions cannot be overstated. With mounting threats to patient data, maintaining confidentiality and secure access to healthcare data is paramount. Preserving this data integrity is where Datawiza’s unique offering steps in.&lt;/p&gt;

&lt;p&gt;Datawiza offers seamless solutions for strengthening EHR/EMR Data Protection. &lt;a href="https://www.datawiza.com/add-mfa-to-legacy-apps-without-code-changes/"&gt;Our comprehensive platform facilitates MFA or 2FA for EHR/EMR&lt;/a&gt;, empowering healthcare providers to bolster their EHR/EMR security measures.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Need for Enhanced Security – MFA/2FA for EHR/EMR
&lt;/h2&gt;

&lt;p&gt;With the rapid evolution in cyber threats, ordinary password protection is often inadequate. Adding layers of security like MFA (Multi-Factor Authentication) and 2FA (Two-Factor Authentication), widely recognized as effective defenses against unauthorized data access, becomes crucial.&lt;/p&gt;

&lt;h2&gt;
  
  
  How Datawiza Adds MFA/2FA to EHR/EMR via a No-Code Approach
&lt;/h2&gt;

&lt;p&gt;Datawiza platform leverages a no-code approach to integrate MFA and 2FA into your EHR and EMR systems. But what does this mean, and how does it work?&lt;/p&gt;

&lt;p&gt;The answer lies in the simplicity and innovation of the Datawiza platform. Our solution acts as a secure gateway between users and your EHR or EMR applications. Instead of having to rewrite or modify the existing system’s source code, Datawiza integrates seamlessly with your current system, sitting in the authentication flow.&lt;/p&gt;

&lt;p&gt;When a user attempts to access your EHR or EMR, they are first directed to the Datawiza Access Proxy (DAP), which integrates easily with your MFA services, like Microsoft Entra ID, Cisco Duo or others. Here, MFA or 2FA is triggered, adding an additional level of security. Only upon successful authentication is the user granted access. The entire process is seamless, doesn’t disrupt user experience, and most importantly, it doesn’t require any code modifications.&lt;/p&gt;

&lt;p&gt;This innovative approach not only simplifies the implementation process, reducing time and resources spent, but it also minimizes potential errors or system vulnerabilities that could arise from code modifications.&lt;/p&gt;

&lt;h2&gt;
  
  
  Datawiza: The Seamless EHR/EMR Security Solution
&lt;/h2&gt;

&lt;p&gt;Our unique proposition lies in enabling Multi-factor Authentication Solutions and Two-factor Authentication Solutions without the necessity of modifying the source code of your existing EHR or EMR applications. This means you can reinforce health records security without substantial changes to your already operational systems – a truly Seamless EHR/EMR Security experience.&lt;/p&gt;

&lt;h2&gt;
  
  
  HIPAA Compliant Authentication – A Step Further in Healthcare Data Security
&lt;/h2&gt;

&lt;p&gt;For healthcare providers, adhering to standards like HIPAA is as important as the security itself. Our platform provides HIPAA Compliant Authentication – ensuring that you tick all the boxes when it comes to compliance and data security.&lt;/p&gt;

&lt;h2&gt;
  
  
  Secure Your Healthcare Data Confidentiality with Datawiza
&lt;/h2&gt;

&lt;p&gt;Embracing Healthcare Data Confidentiality Solutions like the ones offered by Datawiza can drastically minimize the risk of data breaches. Our platform is designed to integrate effectively for a secure EHR and EMR access, enabling enhanced data protection and confidentiality.&lt;/p&gt;

&lt;p&gt;Ready to provide unparalleled data security to your EHR/EMR system? &lt;a href="https://calendly.com/datawiza/30min"&gt;Book a demo&lt;/a&gt; with us today and learn how the Datawiza platform can revolutionize your healthcare data security with no source code modification.&lt;/p&gt;

&lt;p&gt;The post &lt;a href="https://www.datawiza.com/blog/industry/enhancing-ehr-emr-security-with-mfa-2fa-no-source-code-modification-required/"&gt;Enhancing EHR/EMR Security with MFA/2FA – No Source Code Modification Required&lt;/a&gt; appeared first on &lt;a href="https://www.datawiza.com"&gt;Datawiza&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>blog</category>
      <category>industry</category>
    </item>
    <item>
      <title>Which Multi-Factor Authentication Form Is the Strongest?</title>
      <dc:creator>Canming Jiang</dc:creator>
      <pubDate>Sun, 03 Dec 2023 17:12:16 +0000</pubDate>
      <link>https://dev.to/cjddww/which-multi-factor-authentication-form-is-the-strongest-k44</link>
      <guid>https://dev.to/cjddww/which-multi-factor-authentication-form-is-the-strongest-k44</guid>
      <description>&lt;p&gt;In the face of increasing cyber threats in today’s digital era, securing data access is more crucial than ever. Multi-Factor Authentication (MFA), which requires users to provide multiple independent credentials, serves as a proactive defense mechanism. However, it’s essential to consider that all MFA forms offer varying levels of protection and are susceptible to threats such as phishing to different degrees.&lt;/p&gt;

&lt;p&gt;In this post, we compare and contrast seven different MFA forms, aiming to determine which one provides the most robust defense.&lt;/p&gt;

&lt;h2&gt;
  
  
  1. SMS OTP
&lt;/h2&gt;

&lt;p&gt;SMS One-Time Passwords (OTP) are popular due to their simplicity of use. A unique code is dispatched via an SMS message directly to the user’s device. However, this ease of use comes at the cost of potential vulnerability to SIM swap attacks, phishing scams, and message interception. Even in these secure times, a well-staged phishing attack can trick even the most cautious users into revealing their OTP.&lt;/p&gt;

&lt;h2&gt;
  
  
  2. Email OTP
&lt;/h2&gt;

&lt;p&gt;Email One-Time Passwords (OTP) work similarly to their SMS counterparts, the primary difference lying in the delivery method. Although this method circumvents the risk of SMS interception, it still carries its vulnerability to phishing attempts, Man-in-the-Middle (MITM) attacks, and email breaches.&lt;/p&gt;

&lt;h2&gt;
  
  
  3. OTP Using Mobile Authenticator Apps
&lt;/h2&gt;

&lt;p&gt;Using Mobile Authenticator Apps, such as Google Authenticator, the OTPs are generated on the user’s device itself, thereby avoiding the risky transmission channels. However, phishing attacks remain a threat as users can be manipulated into sharing their OTP.&lt;/p&gt;

&lt;h2&gt;
  
  
  4. Push Notification Using Mobile Authenticator Apps
&lt;/h2&gt;

&lt;p&gt;By incorporating Mobile Authenticator Apps like Duo Security for push notifications, the security level is noticeably ramped up. Upon any authentication attempt, a push notification surfaces on the user’s device, awaiting their approval or denial. Even though this reduces exposure to phishing, users could unwittingly approve a fraudulent request.&lt;/p&gt;

&lt;h2&gt;
  
  
  5. Push Notification with Number Matching
&lt;/h2&gt;

&lt;p&gt;An extra layer of security is added with push notification using number matching. Under this system, users are shown a specific number when they respond to an MFA push notification. To complete the verification process, they must accurately enter this number into the authenticator app. Despite this additional interactive step, phishing risks can’t be completely disregarded.&lt;/p&gt;

&lt;h2&gt;
  
  
  6. FIDO2-Compliant Authenticators
&lt;/h2&gt;

&lt;p&gt;FIDO2-Compliant Authenticators like YubiKeys or biometric readers represent an advanced level of MFA. They use cryptographic login credentials and are tied directly to a hardware device. These authenticators significantly reduce the risk of phishing, MITM, and replay attacks, marking them as true phishing-resistant MFA mechanisms.&lt;/p&gt;

&lt;h2&gt;
  
  
  7. PKI Certificate-Based Authentication (CBA)
&lt;/h2&gt;

&lt;p&gt;The PKI Certificate-Based Authentication (CBA) MFA method, employed by high-security government organizations, leverages smart cards, like PIV (Personal Identity Verification) card or CAC (Common Access Card). These provide a highly secure, phishing-resistant two-factor solution resilient to various forms of cyber-attacks.&lt;/p&gt;

&lt;p&gt;In conclusion, clear winners in the strength hierarchy of MFA forms are the phishing-resistant hardware-based authenticators—FIDO2-compliant devices and PKI Certificate-Based Authentication. &lt;/p&gt;

&lt;p&gt;However, the selection of an MFA solution should take into account more than just strength—it should balance user convenience, deployment complexity, and cost-effectiveness. This balance ensures optimal user adoption and a safer digital environment. But remember, the most effective cybersecurity is always a combination of advanced technology and user awareness.&lt;/p&gt;

&lt;p&gt;At Datawiza, we streamline the implementation of various MFA forms with our no-code solution. &lt;a href="https://www.datawiza.com/about-us/"&gt;If you’re ready to enhance your cybersecurity, contact us. &lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The post &lt;a href="https://www.datawiza.com/blog/industry/which-multi-factor-authentication-form-is-the-strongest/"&gt;Which Multi-Factor Authentication Form Is the Strongest?&lt;/a&gt; appeared first on &lt;a href="https://www.datawiza.com"&gt;Datawiza&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>blog</category>
      <category>industry</category>
    </item>
  </channel>
</rss>
