Roles of the Nerdhorn


In this example, the nerdhorn is both parent and partner and therefore has other functions, authorizations and tasks to do. As in normal life, digital identities have different roles. Associated with these roles are permissions. Users can have several user roles. A typical concept that implements this is RBAC, Role Based Access Control. Often the […]

Single Sign-On (SSO) for the Nerdhorn


Single Sign-On (SSO) describes the one-time authentication of a user, whereby he or she is authorized to use all associated services without having to authenticate again. SSO is often implemented in companies. If the user changes the device (e.g. from computer to tablet), the authentication is of course no longer necessary. SSO has the advantage […]

Nerdhorn with Password Manager


You don’t have to waste papers to manage your various passwords. In fact, this is counterproductive. It is better to save your passwords in a password manager. Password managers come in both commercial and open source versions. Many password managers also have password generators that help you choose good passwords. This already improves security, but […]

Nerdhorn wants to be secure


A single software or security measure is not enough to ensure security in a network. It requires different layers or pieces of the puzzle that need to interlock. Typical measures are, for example, firewalls and intrusion detection systems. A user account alone is not enough either. A user only has as many authorizations as he […]

Federated Nerdhorn


Federated identity management (FIM) is a type of identity management across multiple entities, such as universities and service providers. These entities form a so-called federation in which they trust each other to a certain extent. The user information of a user remains with his or her home organization. This is used to identify and authenticate […]