Since the last update, there is a now a new feature in the Univention App Center: “App Settings”. It allows simple configuration of an App from within the Univention Management Console. We developed this new feature so as to allow App Providers to improve the integration depth of an App in UCS and simplify the set-up of an App considerably with easy-to-use tools.
In this brief introduction we want to give you an idea of some important concepts for identity and access management (IAM), and of the related challenges organizations face. We will also see how IAM is one of UCS strengths and why UCS is being adopted by large companies, and by governmental institutions, to manage tens of million identities.
After the waves of attack by ransomware WannaCry in May and its successor Petya in June, agitation prevails in many IT departments. The economic damage is now already in the billions and CIOs are under great pressure to protect companies and their users from new attacks. But how can you protect your company against these attacks, which have the potential to destroy all files?
In the owncloud blog we announced a number of new features to better protect your data. As the free community edition of ownCloud is also available in the Univention App Center, I am glad to share this inform with you here today:
A total of 9 times we have now awarded the Univention Prize. The objective of this competition was to support the employment of Open Source in a university context and make it known to a broad public. The response impressed us. In some years, there were almost 40 bachelor, master or diploma theses submitted for the competition.
And the broad press coverage in well-known media such as heise.de, the Linux Magazine, Pro-Linux or golem.de certainly contributed to deliver the message to a wide audience that Open Source has nothing to do with spaghetti code, idealism or even stubborn dogmatism. So you could say: The goal is reached!
Workplaces become more remote and mobile while individuals are increasingly equipped with (private) mobile devices. In this context it is good to know about RADIUS, because private end devices require simple access to an organization’s network. At the same time you need to avoid that these devices open the doors for malware or leakage. RADIUS is such an instrument for the construction of secure, decentralized work structures and equally a powerful tool for the authentication of mobile device accesses to networks.
In the following, we like to give you a brief understanding of what RADIUS is and how you can use it with UCS.
Samba 4 has become the tool of choice for companies with diverse clients that seek a Linux-based central identity management. However, a growing number of organizations are offering work from home options and manage distributed operations like construction companies with a computer at every construction site or an insurance provider with several offices. The securing of all authentication processes when employees log in your network also from outside, is critical to protect your data.
But how to do that?
You need to add a VPN solution which starts before the login if you want to enjoy the advantages of single sign-on and policies that Samba provides. The following how-to will describe how to add OpenVPN to an existing Samba 4 installation to automatically secure client authentications over an untrusted network.
The well-known project management solution OpenProject is now available in a new version. The application offers a powerful feature set for both traditional as well as agile project management and empowers project teams to efficiently plan, steer and communicate within projects.
The Linux blog It’s FOSS published an article about the possibilitiy to use Univention Corporate Server as a home server. This article provides a step by step process to set this up. It also informs on how to extend UCS by the groupware Kopano and the filesharing solution Nextcloud to have a complete , safe to use package as an alternative to the standard, proprietary solutions.
What is Squid?
Squid is a caching proxy employed primarily for web content delivered via the protocols HTTP, HTTPS, and even FTP. Squid stores websites and their content in a temporary cache, making them available to a number of clients simultaneously. Consequently, the use of Squid makes it possible to speed up the response times when opening websites considerably and reduce data volumes at the same time. In addition to this core function, Squid also boasts other extensive options such as control of users’ access to the Internet (ACLs). This is a scenario which is particularly interesting for use in schools and other public facilities as well as for client authentication. Users and devices are only permitted access to the Internet if they can authenticate themselves against the proxy.
When recently assisting a customer in choosing a new cloud service provider, the providers of choice offered 95%, 99%, and 99.9% availability labeling their service “High Availability”. For the human brain and considering a scale from 0% to 100% all of these numbers sound rather good, and we would naturally think, that these services almost never fail. However, let us have a closer look at what high availability truly means for IT environments and how it affects UCS and let us think about why you should also consider the time to recovery and planned downtimes.