Collaborate in the Cloud

SaaS/PaaS conversations are coming up more and more in my customer meetings. I think it is important to understand the difference between authentication and authorization and what fits a cloud model and what does not. This post does a great job of outlining some of the strengths F5 Access Policy Manager provides in regards to authentication as well as APM’s ability to help you consolidate solutions/infrastructure.

psilva's prophecies

Employee collaboration and access to communication tools are essential for workplace productivity. Organizations are increasing their use of Microsoft Office 365, a subscription-based service that provides hosted versions of familiar Microsoft applications. Most businesses choose Exchange Online as the first app in Office 365 they adopt.

The challenge with any SaaS application such as Office 365 is that user authentication is usually handled by the application itself, so user credentials are typically stored and managed in the cloud by the provider. The challenge for IT is to properly authenticate the employee (whether located inside or outside the corporate network) to a highly available identity provider (such as Active Directory).

Authentication without complexity


Even though Office 365 runs in a Microsoft-hosted cloud environment, user authentication and authorization are often accomplished by federating on premises Active Directory with Office 365. Organizations subscribing to Office 365 may deploy Active Directory Federation Services (ADFS)…

View original post 757 more words

A Living Architecture

Great overview of F5’s GTM capabilities. If you still think all we do is load balancing you’re missing all the cool stuff!

psilva's prophecies

You often hear people say, ‘oh, this is a living document,’ to indicate that the information is continually updated or edited to reflect changes that may occur during the life of the document. Your infrastructure is also living and dynamic. You make changes, updates or upgrades to address the ever changing requirements of your employees, web visitors, customers, partners, networks, applications and anything else tied to your systems.

This is also true for F5’s Reference Architectures. They too are living architectures.

F5’s Reference Architectures are the proof-points or customer scenarios that drive Synthesis to your data center and beyond.

When we initially built out these RA’s, we knew that they’d be continuously updated to not only reflect new BIG-IP functionality but also show new solutions to the changing challenges IT faces daily. We’ve recently updated the Intelligent DNS Scale Reference Architecture to include more security (DNSSEC) and to…

View original post 451 more words