Remote access poses both a security and a compliance challenge to IT organizations. The ability to positively identify users (often remote users) requesting access to resources is a critical consideration in achieving a secure remote access solution. Deploying remote access solution without strong authentication is like putting your sensitive data in a vault (the datacenter), and leaving the key (user password) under the door mat.
Office 365 from Microsoft is a cloud-based service that is designed to help meet your organization’s needs for robust security, reliability, and user productivity. This document provides guidelines for deploying certificate-based authentication (CBA) for user authentication to Office 365 using Thales (Gemalto) tokens.Download