More Security in OpenOTP Token
Attackers have developed new ways to abuse push-based authentication. Techniques such as push bombing (flooding the user with login requests), fatigue attacks (hoping the user approves one request out of annoyance), and accidental approvals (a mistaken tap on the screen) are becoming common. These attacks …
Raising the Bar for PAM: User Access Approvals
OpenOTP / WebADM now lets you require approvals before users get into sensitive systems. You can define approvers per application policy, choose how many approvals are needed, set approval time windows, make approvals one‑time or bound to a user’s IP, and exempt (allowlist) specific users. Approvals can …
Deep Dive: Two-Way Identity Synchronization with WebADM and Cloud IAM Providers
In our previous blog, Next-Gen IAM Management for Mixed Cloud Enterprise AD – The RCDevs Approach, we introduced the concept of two-way directory synchronization as a core capability of WebADM’s unified IAM platform. In this follow-up post, we take a closer look at how WebADM …
Next-Gen IAM Management for Mixed Cloud & Enterprise AD: The RCDevs Approach
In today’s hybrid infrastructure landscape, identity and access management (IAM) is a complex and ever-moving target. Enterprises rely on a mix of on-prem Active Directory (AD), cloud IAMs like Azure Entra ID, Okta, Ping, OneLogin, and DUO, and increasingly, customer-facing identity stores running over SQL …