{"id":349,"date":"2009-09-14T11:21:00","date_gmt":"2009-09-14T15:21:00","guid":{"rendered":"http:\/\/jdhitsolutions.com\/blog\/2009\/09\/architecting-the-right-solutions-for-strong-authentication\/"},"modified":"2009-09-14T11:22:41","modified_gmt":"2009-09-14T15:22:41","slug":"architecting-the-right-solutions-for-strong-authentication","status":"publish","type":"post","link":"https:\/\/jdhitsolutions.com\/blog\/writing\/349\/architecting-the-right-solutions-for-strong-authentication\/","title":{"rendered":"Architecting the Right Solution for Strong Authentication"},"content":{"rendered":"<p><a href=\"http:\/\/nexus.realtimepublishers.com\/esarssa.php\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" style=\"border-right-width: 0px; margin: 0px 5px 5px 0px; display: inline; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px\" title=\"esarssa[1]\" border=\"0\" alt=\"esarssa[1]\" align=\"left\" src=\"http:\/\/jdhitsolutions.com\/blog\/wp-content\/uploads\/2009\/09\/esarssa1.gif\" width=\"125\" height=\"160\" \/><\/a> My first project with <a href=\"http:\/\/www.realtimepublishers.com\/\" target=\"_blank\">RealTime Publishers<\/a> is now available. I wrote a short 3 part series on strong authentication: <a href=\"http:\/\/nexus.realtimepublishers.com\/esarssa.php\" target=\"_blank\">Architecting the Right Solution for Strong Authentication<\/a> sponsored by <a href=\"http:\/\/www.imprivata.com\/\" target=\"_blank\">Imprivata<\/a>.<\/p>\n<h5>Synopsis<\/h5>\n<p><em><font color=\"#0000ff\">\u201cInsufficient security is a hidden problem that many businesses are not fully aware of until it is too late. Weak authentication, silos of compliance reporting, a multitude of management tools, and poor security practices contribute to data breaches and compromised systems and leave organizations vulnerable to other pervasive threats. Fortunately, strong authentication systems can address these issues. A combination of consolidated identity management, single sign-on services, and comprehensive compliance reporting can reduce compliance costs, improve security, and remove significant drag on innovation. The Essentials Series: Architecting the Right Solution for Strong Authentication examines ways in which weak authentication hampers business operations, criteria for selecting a strong authentication system, and tips on how to deploy and manage strong authentication systems to control risks and improve the efficiency of business operations. \u201c<\/font><\/em><\/p>\n<p>&#160;<\/p>\n<p>You can download the chapters individually or as a zip file.&#160; I hope you\u2019ll take a look.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>My first project with RealTime Publishers is now available. I wrote a short 3 part series on strong authentication: Architecting the Right Solution for Strong Authentication sponsored by Imprivata. Synopsis \u201cInsufficient security is a hidden problem that many businesses are not fully aware of until it is too late. Weak authentication, silos of compliance reporting,&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[48,62,3],"tags":[90,52,554],"class_list":["post-349","post","type-post","status-publish","format-standard","hentry","category-realtime","category-security","category-writing","tag-authentication","tag-realtimepublishers","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Architecting the Right Solution for Strong Authentication &#8226; The Lonely Administrator<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jdhitsolutions.com\/blog\/writing\/349\/architecting-the-right-solutions-for-strong-authentication\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Architecting the Right Solution for Strong Authentication &#8226; The Lonely Administrator\" \/>\n<meta property=\"og:description\" content=\"My first project with RealTime Publishers is now available. I wrote a short 3 part series on strong authentication: Architecting the Right Solution for Strong Authentication sponsored by Imprivata. Synopsis \u201cInsufficient security is a hidden problem that many businesses are not fully aware of until it is too late. Weak authentication, silos of compliance reporting,...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jdhitsolutions.com\/blog\/writing\/349\/architecting-the-right-solutions-for-strong-authentication\/\" \/>\n<meta property=\"og:site_name\" content=\"The Lonely Administrator\" \/>\n<meta property=\"article:published_time\" content=\"2009-09-14T15:21:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2009-09-14T15:22:41+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/jdhitsolutions.com\/blog\/wp-content\/uploads\/2009\/09\/esarssa1.gif\" \/>\n<meta name=\"author\" content=\"Jeffery Hicks\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@JeffHicks\" \/>\n<meta name=\"twitter:site\" content=\"@JeffHicks\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeffery Hicks\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/writing\\\/349\\\/architecting-the-right-solutions-for-strong-authentication\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/writing\\\/349\\\/architecting-the-right-solutions-for-strong-authentication\\\/\"},\"author\":{\"name\":\"Jeffery Hicks\",\"@id\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/#\\\/schema\\\/person\\\/d0258030b41f07fd745f4078bdf5b6c9\"},\"headline\":\"Architecting the Right Solution for Strong Authentication\",\"datePublished\":\"2009-09-14T15:21:00+00:00\",\"dateModified\":\"2009-09-14T15:22:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/writing\\\/349\\\/architecting-the-right-solutions-for-strong-authentication\\\/\"},\"wordCount\":183,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/#\\\/schema\\\/person\\\/d0258030b41f07fd745f4078bdf5b6c9\"},\"image\":{\"@id\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/writing\\\/349\\\/architecting-the-right-solutions-for-strong-authentication\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/jdhitsolutions.com\\\/blog\\\/wp-content\\\/uploads\\\/2009\\\/09\\\/esarssa1.gif\",\"keywords\":[\"authentication\",\"RealTimePublishers\",\"security\"],\"articleSection\":[\"RealTime\",\"security\",\"Writing\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/writing\\\/349\\\/architecting-the-right-solutions-for-strong-authentication\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/writing\\\/349\\\/architecting-the-right-solutions-for-strong-authentication\\\/\",\"url\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/writing\\\/349\\\/architecting-the-right-solutions-for-strong-authentication\\\/\",\"name\":\"Architecting the Right Solution for Strong Authentication &#8226; The Lonely Administrator\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/writing\\\/349\\\/architecting-the-right-solutions-for-strong-authentication\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/writing\\\/349\\\/architecting-the-right-solutions-for-strong-authentication\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/jdhitsolutions.com\\\/blog\\\/wp-content\\\/uploads\\\/2009\\\/09\\\/esarssa1.gif\",\"datePublished\":\"2009-09-14T15:21:00+00:00\",\"dateModified\":\"2009-09-14T15:22:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/writing\\\/349\\\/architecting-the-right-solutions-for-strong-authentication\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/writing\\\/349\\\/architecting-the-right-solutions-for-strong-authentication\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/writing\\\/349\\\/architecting-the-right-solutions-for-strong-authentication\\\/#primaryimage\",\"url\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/wp-content\\\/uploads\\\/2009\\\/09\\\/esarssa1.gif\",\"contentUrl\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/wp-content\\\/uploads\\\/2009\\\/09\\\/esarssa1.gif\",\"width\":\"125\",\"height\":\"160\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/writing\\\/349\\\/architecting-the-right-solutions-for-strong-authentication\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"RealTime\",\"item\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/category\\\/realtime\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Architecting the Right Solution for Strong Authentication\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/\",\"name\":\"The Lonely Administrator\",\"description\":\"Practical Advice for the Automating IT Pro\",\"publisher\":{\"@id\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/#\\\/schema\\\/person\\\/d0258030b41f07fd745f4078bdf5b6c9\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/#\\\/schema\\\/person\\\/d0258030b41f07fd745f4078bdf5b6c9\",\"name\":\"Jeffery Hicks\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/832ae5d438fdcfc1420d720cd1991307927de8a0b12f2342e81c30f773e21098?s=96&d=wavatar&r=pg\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/832ae5d438fdcfc1420d720cd1991307927de8a0b12f2342e81c30f773e21098?s=96&d=wavatar&r=pg\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/832ae5d438fdcfc1420d720cd1991307927de8a0b12f2342e81c30f773e21098?s=96&d=wavatar&r=pg\",\"caption\":\"Jeffery Hicks\"},\"logo\":{\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/832ae5d438fdcfc1420d720cd1991307927de8a0b12f2342e81c30f773e21098?s=96&d=wavatar&r=pg\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Architecting the Right Solution for Strong Authentication &#8226; The Lonely Administrator","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jdhitsolutions.com\/blog\/writing\/349\/architecting-the-right-solutions-for-strong-authentication\/","og_locale":"en_US","og_type":"article","og_title":"Architecting the Right Solution for Strong Authentication &#8226; The Lonely Administrator","og_description":"My first project with RealTime Publishers is now available. I wrote a short 3 part series on strong authentication: Architecting the Right Solution for Strong Authentication sponsored by Imprivata. Synopsis \u201cInsufficient security is a hidden problem that many businesses are not fully aware of until it is too late. Weak authentication, silos of compliance reporting,...","og_url":"https:\/\/jdhitsolutions.com\/blog\/writing\/349\/architecting-the-right-solutions-for-strong-authentication\/","og_site_name":"The Lonely Administrator","article_published_time":"2009-09-14T15:21:00+00:00","article_modified_time":"2009-09-14T15:22:41+00:00","og_image":[{"url":"http:\/\/jdhitsolutions.com\/blog\/wp-content\/uploads\/2009\/09\/esarssa1.gif","type":"","width":"","height":""}],"author":"Jeffery Hicks","twitter_card":"summary_large_image","twitter_creator":"@JeffHicks","twitter_site":"@JeffHicks","twitter_misc":{"Written by":"Jeffery Hicks","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jdhitsolutions.com\/blog\/writing\/349\/architecting-the-right-solutions-for-strong-authentication\/#article","isPartOf":{"@id":"https:\/\/jdhitsolutions.com\/blog\/writing\/349\/architecting-the-right-solutions-for-strong-authentication\/"},"author":{"name":"Jeffery Hicks","@id":"https:\/\/jdhitsolutions.com\/blog\/#\/schema\/person\/d0258030b41f07fd745f4078bdf5b6c9"},"headline":"Architecting the Right Solution for Strong Authentication","datePublished":"2009-09-14T15:21:00+00:00","dateModified":"2009-09-14T15:22:41+00:00","mainEntityOfPage":{"@id":"https:\/\/jdhitsolutions.com\/blog\/writing\/349\/architecting-the-right-solutions-for-strong-authentication\/"},"wordCount":183,"commentCount":0,"publisher":{"@id":"https:\/\/jdhitsolutions.com\/blog\/#\/schema\/person\/d0258030b41f07fd745f4078bdf5b6c9"},"image":{"@id":"https:\/\/jdhitsolutions.com\/blog\/writing\/349\/architecting-the-right-solutions-for-strong-authentication\/#primaryimage"},"thumbnailUrl":"http:\/\/jdhitsolutions.com\/blog\/wp-content\/uploads\/2009\/09\/esarssa1.gif","keywords":["authentication","RealTimePublishers","security"],"articleSection":["RealTime","security","Writing"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/jdhitsolutions.com\/blog\/writing\/349\/architecting-the-right-solutions-for-strong-authentication\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/jdhitsolutions.com\/blog\/writing\/349\/architecting-the-right-solutions-for-strong-authentication\/","url":"https:\/\/jdhitsolutions.com\/blog\/writing\/349\/architecting-the-right-solutions-for-strong-authentication\/","name":"Architecting the Right Solution for Strong Authentication &#8226; The Lonely Administrator","isPartOf":{"@id":"https:\/\/jdhitsolutions.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jdhitsolutions.com\/blog\/writing\/349\/architecting-the-right-solutions-for-strong-authentication\/#primaryimage"},"image":{"@id":"https:\/\/jdhitsolutions.com\/blog\/writing\/349\/architecting-the-right-solutions-for-strong-authentication\/#primaryimage"},"thumbnailUrl":"http:\/\/jdhitsolutions.com\/blog\/wp-content\/uploads\/2009\/09\/esarssa1.gif","datePublished":"2009-09-14T15:21:00+00:00","dateModified":"2009-09-14T15:22:41+00:00","breadcrumb":{"@id":"https:\/\/jdhitsolutions.com\/blog\/writing\/349\/architecting-the-right-solutions-for-strong-authentication\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jdhitsolutions.com\/blog\/writing\/349\/architecting-the-right-solutions-for-strong-authentication\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jdhitsolutions.com\/blog\/writing\/349\/architecting-the-right-solutions-for-strong-authentication\/#primaryimage","url":"https:\/\/jdhitsolutions.com\/blog\/wp-content\/uploads\/2009\/09\/esarssa1.gif","contentUrl":"https:\/\/jdhitsolutions.com\/blog\/wp-content\/uploads\/2009\/09\/esarssa1.gif","width":"125","height":"160"},{"@type":"BreadcrumbList","@id":"https:\/\/jdhitsolutions.com\/blog\/writing\/349\/architecting-the-right-solutions-for-strong-authentication\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"RealTime","item":"https:\/\/jdhitsolutions.com\/blog\/category\/realtime\/"},{"@type":"ListItem","position":2,"name":"Architecting the Right Solution for Strong Authentication"}]},{"@type":"WebSite","@id":"https:\/\/jdhitsolutions.com\/blog\/#website","url":"https:\/\/jdhitsolutions.com\/blog\/","name":"The Lonely Administrator","description":"Practical Advice for the Automating IT Pro","publisher":{"@id":"https:\/\/jdhitsolutions.com\/blog\/#\/schema\/person\/d0258030b41f07fd745f4078bdf5b6c9"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jdhitsolutions.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/jdhitsolutions.com\/blog\/#\/schema\/person\/d0258030b41f07fd745f4078bdf5b6c9","name":"Jeffery Hicks","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/832ae5d438fdcfc1420d720cd1991307927de8a0b12f2342e81c30f773e21098?s=96&d=wavatar&r=pg","url":"https:\/\/secure.gravatar.com\/avatar\/832ae5d438fdcfc1420d720cd1991307927de8a0b12f2342e81c30f773e21098?s=96&d=wavatar&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/832ae5d438fdcfc1420d720cd1991307927de8a0b12f2342e81c30f773e21098?s=96&d=wavatar&r=pg","caption":"Jeffery Hicks"},"logo":{"@id":"https:\/\/secure.gravatar.com\/avatar\/832ae5d438fdcfc1420d720cd1991307927de8a0b12f2342e81c30f773e21098?s=96&d=wavatar&r=pg"}}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":1366,"url":"https:\/\/jdhitsolutions.com\/blog\/windows-7\/1366\/managing-wsus-from-a-non-domain-member\/","url_meta":{"origin":349,"position":0},"title":"Managing WSUS from a Non-Domain Member","author":"Jeffery Hicks","date":"April 25, 2011","format":false,"excerpt":"I run a lot of test machines in my home office network and rely on WSUS. However, my primary desktop is a stand alone system, that is not a domain member. This has always meant that I needed a remote desktop connection to the WSUS server to approve updates. The\u2026","rel":"","context":"In &quot;Windows 7&quot;","block_context":{"text":"Windows 7","link":"https:\/\/jdhitsolutions.com\/blog\/category\/windows-7\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":129,"url":"https:\/\/jdhitsolutions.com\/blog\/powershell\/129\/practical-powershell\/","url_meta":{"origin":349,"position":1},"title":"Practical PowerShell","author":"Jeffery Hicks","date":"February 13, 2008","format":false,"excerpt":"I am writing a new monthly column for a new eJournal from RealTime Publishers. The column, Practical PowerShell, will be a regular feature in Windows Administration in Realtime. The eJournal is a free PDF although I think you have to give up an email address. My column is intended to\u2026","rel":"","context":"In &quot;PowerShell&quot;","block_context":{"text":"PowerShell","link":"https:\/\/jdhitsolutions.com\/blog\/category\/powershell\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1511,"url":"https:\/\/jdhitsolutions.com\/blog\/wmi\/1511\/get-wmi-namespace\/","url_meta":{"origin":349,"position":2},"title":"Get WMI Namespace","author":"Jeffery Hicks","date":"June 16, 2011","format":false,"excerpt":"PowerShell and WMI just seem to go together like peanut butter and jelly, beer and pretzels, or salt and pepper. However, discovering things about WMI isn't always so easy. There are plenty of tools and scripts that will help you uncover WMI goodness, but here's another one anyway. Today's PowerShell\u2026","rel":"","context":"In &quot;WMI&quot;","block_context":{"text":"WMI","link":"https:\/\/jdhitsolutions.com\/blog\/category\/wmi\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":37,"url":"https:\/\/jdhitsolutions.com\/blog\/powershell\/37\/get-active-directory-user-information-in-powershell\/","url_meta":{"origin":349,"position":3},"title":"Get Active Directory User Information in PowerShell","author":"Jeffery Hicks","date":"July 5, 2006","format":false,"excerpt":"One feature that PowerShell will likely be missing when it first ships is solid support for ADSI and working with Active Directory. You can use .NET DirectoryEntry objects but it feels more like programming and less like scripting. Another option for working with Active Directory in PowerShell is to use\u2026","rel":"","context":"In &quot;PowerShell&quot;","block_context":{"text":"PowerShell","link":"https:\/\/jdhitsolutions.com\/blog\/category\/powershell\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":5014,"url":"https:\/\/jdhitsolutions.com\/blog\/powershell\/5014\/friday-fun-a-better-test-wsman\/","url_meta":{"origin":349,"position":4},"title":"Friday Fun: A Better Test-WsMan","author":"Jeffery Hicks","date":"May 27, 2016","format":false,"excerpt":"I saw a question on Facebook about how to get Test-WsMan to return a simple Boolean result. The Test-Connection cmdlet has a -Quiet parameter that makes this possible. But Test-Wsman does not.\u00a0 Certainly, you could script a comparable outcome. Here's one way: \"chi-hvr2\",\"chi-hvr1\",\"chi-p50\" | foreach { $r = Test-WSMan $_\u2026","rel":"","context":"In &quot;Friday Fun&quot;","block_context":{"text":"Friday Fun","link":"https:\/\/jdhitsolutions.com\/blog\/category\/friday-fun\/"},"img":{"alt_text":"image","src":"https:\/\/i0.wp.com\/jdhitsolutions.com\/blog\/wp-content\/uploads\/2016\/05\/image_thumb-2.png?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/jdhitsolutions.com\/blog\/wp-content\/uploads\/2016\/05\/image_thumb-2.png?resize=350%2C200 1x, https:\/\/i0.wp.com\/jdhitsolutions.com\/blog\/wp-content\/uploads\/2016\/05\/image_thumb-2.png?resize=525%2C300 1.5x"},"classes":[]},{"id":495,"url":"https:\/\/jdhitsolutions.com\/blog\/writing\/495\/service-management-in-an-uncertain-economy\/","url_meta":{"origin":349,"position":5},"title":"Service Management in an Uncertain Economy","author":"Jeffery Hicks","date":"November 10, 2009","format":false,"excerpt":"The first chapter of my new eBook from RealTime is now available online. The Executive Guide to Service Management in an Uncertain Economy is a 4 part series on developing an effective service management strategy. The series is intended to demonstrate what steps you can take to align IT and\u2026","rel":"","context":"In &quot;RealTime&quot;","block_context":{"text":"RealTime","link":"https:\/\/jdhitsolutions.com\/blog\/category\/realtime\/"},"img":{"alt_text":"egsmue","src":"https:\/\/i0.wp.com\/jdhitsolutions.com\/blog\/wp-content\/uploads\/2009\/11\/egsmue.gif?resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/jdhitsolutions.com\/blog\/wp-json\/wp\/v2\/posts\/349","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jdhitsolutions.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jdhitsolutions.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jdhitsolutions.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jdhitsolutions.com\/blog\/wp-json\/wp\/v2\/comments?post=349"}],"version-history":[{"count":0,"href":"https:\/\/jdhitsolutions.com\/blog\/wp-json\/wp\/v2\/posts\/349\/revisions"}],"wp:attachment":[{"href":"https:\/\/jdhitsolutions.com\/blog\/wp-json\/wp\/v2\/media?parent=349"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jdhitsolutions.com\/blog\/wp-json\/wp\/v2\/categories?post=349"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jdhitsolutions.com\/blog\/wp-json\/wp\/v2\/tags?post=349"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}