<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">
blog /
Supercharge Your SSH and Kubernetes Resources with Remote Identities

Supercharge Your SSH and Kubernetes Resources with Remote Identities

Learn how Remote Identities helps you leverage SSH and k8s capabilities to capitalize on infrastructure workflow investments you’ve already made.
strongDM kicks it into overdrive

strongDM kicks it into overdrive

With the release of tighter integrations with Okta and Azure AD (or any SCIM-based directory service for that matter), you now have the ability to manage just-in-time, least-privilege access to your critical infrastructure right from your preferred identity provider (IdP), dramatically reducing the time needed to approve requests and grant access.
Welcome to the Year of Access

Welcome to the Year of Access

strongDM asked 600 DevOps pros about the state of infrastructure access today. Their response? It’s out of control. Here’s an overview of our results.
RBAC vs. ABAC | Pros, Cons, and Major Distinctions

RBAC vs. ABAC | Pros, Cons, and Major Distinctions

This article presents an overview of RBAC vs. ABAC, plus several additional models of access control, including PBAC, ACL, and DAC. You will learn what these methods are, how they differ from each other, and the pros and cons of each.
Access Management 101: Understanding Roles & Access

Access Management 101: Understanding Roles & Access

Here’s the scenario: On one side, you’re inundated with requests to provide access to critical infrastructure in order to enable teams to do their jobs; on the other side, you’re tasked with auditing access and ensuring that security to those systems is solid.
Getting Started: Role & Access Discovery

Getting Started: Role & Access Discovery

Discovering “who has access to what” is critical for zero trust and PAM. These six steps will get you started with Access Management.
Role & Access Discovery | Who Has Access to What Now?

Role & Access Discovery | Who Has Access to What Now?

Role & Access Discovery aims to answer “Does this person, in this role, need access to that system?” Learn why this is a critical part of access management.
Kubernetes Role-Based Access Control (RBAC)

Kubernetes Role-Based Access Control (RBAC)

An explanation of role-based access control (RBAC) in Kubernetes, why it is hard to manage manually and practical strategies for simplifying RBAC in large-scale clusters.
StrongDM app UI showing available infrastructure resources
Connect your first server or database in 5 minutes. No kidding.