Best Practices for IT Password Security<\/a>"},{"list_item":"Blog Post | <a href=https://jumpcloud.com/"https:////jumpcloud.com//blog//what-is-single-sign-on-sso/">What is Single Sign-On (SSO)?<\/a>"},{"list_item":"Blog Post | <a href=https://jumpcloud.com/"https:////jumpcloud.com//blog//mfa-effectiveness/">How Effective is Multi-Factor Authentication?<\/a>"}],"cta":{"copy":"","url":"","target":false}}},{"tab_header_type":"text","tab_header":"Dynamic Access Control","tab_header_icon":false,"content":{"image":{"ID":74946,"id":74946,"title":"Dynamic Access Control","filename":"unnamed-1.png","filesize":55560,"url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/02\/unnamed-1.png","link":"https:\/\/jumpcloud.com\/use-cases\/access-management\/unnamed-1-3","alt":"Dynamic Access Control","author":"197","description":"","caption":"","name":"unnamed-1-3","status":"inherit","uploaded_to":74939,"date":"2023-02-08 23:36:41","modified":"2023-02-08 23:36:54","menu_order":0,"mime_type":"image\/png","type":"image","subtype":"png","icon":"https:\/\/jumpcloud.com\/wp-includes\/images\/media\/default.png","width":512,"height":380,"sizes":{"thumbnail":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/02\/unnamed-1-150x150.png","thumbnail-width":150,"thumbnail-height":150,"medium":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/02\/unnamed-1-300x223.png","medium-width":300,"medium-height":223,"medium_large":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/02\/unnamed-1.png","medium_large-width":512,"medium_large-height":380,"large":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/02\/unnamed-1.png","large-width":512,"large-height":380,"1536x1536":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/02\/unnamed-1.png","1536x1536-width":512,"1536x1536-height":380,"2048x2048":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/02\/unnamed-1.png","2048x2048-width":512,"2048x2048-height":380}},"icon":false,"title":"","blurb":"<p>With digital threats looming around every corner, the perimeter has shifted to the identity, and Zero Trust security measures are essential to effectively secure critical resources.<br \/>\n <br \/>\nWith JumpCloud, you can develop context-based access policies, enforced automatically via configurable dynamic groups, to ensure that no matter where or how users work, the right access is granted in the right situations and at the right time.<\/p>\n","checkmark_list":[{"list_item":"Blog Post | <a href=https://jumpcloud.com/"https:////jumpcloud.com//blog//conditional-access-policies-examples/">Examples of Conditional Access Policies<\/a>"},{"list_item":"Blog Post | <a href=https://jumpcloud.com/"https:////jumpcloud.com//blog//welcome-to-groups/">How JumpCloud Groups Simplify Access Control with Dynamic Groups<\/a>"},{"list_item":"Blog Post | <a href=https://jumpcloud.com/"https:////jumpcloud.com//blog//different-types-access-control/">What Are the Different Types of Access Control?<\/a>"}],"cta":{"copy":"","url":"","target":false}}},{"tab_header_type":"text","tab_header":"Passwordless Access","tab_header_icon":false,"content":{"image":{"ID":97664,"id":97664,"title":"Jumpcloudgo","filename":"jumpcloudgo.png","filesize":171620,"url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/09\/jumpcloudgo.png","link":"https:\/\/jumpcloud.com\/use-cases\/access-management\/jumpcloudgo","alt":"","author":"125","description":"","caption":"","name":"jumpcloudgo","status":"inherit","uploaded_to":74939,"date":"2023-09-07 00:12:31","modified":"2023-09-07 00:12:31","menu_order":0,"mime_type":"image\/png","type":"image","subtype":"png","icon":"https:\/\/jumpcloud.com\/wp-includes\/images\/media\/default.png","width":1436,"height":1061,"sizes":{"thumbnail":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/09\/jumpcloudgo-150x150.png","thumbnail-width":150,"thumbnail-height":150,"medium":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/09\/jumpcloudgo-300x222.png","medium-width":300,"medium-height":222,"medium_large":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/09\/jumpcloudgo-768x567.png","medium_large-width":768,"medium_large-height":567,"large":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/09\/jumpcloudgo-1024x757.png","large-width":1024,"large-height":757,"1536x1536":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/09\/jumpcloudgo.png","1536x1536-width":1436,"1536x1536-height":1061,"2048x2048":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2023\/09\/jumpcloudgo.png","2048x2048-width":1436,"2048x2048-height":1061}},"icon":false,"title":"","blurb":"<p>Supporting hybrid and remote work can be challenging. JumpCloud\u2019s open directory platform makes it easy to provide users with secure access to all resources, including LDAP and RADIUS resources, with none of the traditional setup or hassle.<br \/>\n <br \/>\nAdd JumpCloud Go\u2122 to provide a hardware-protected and phishing-resistant passwordless login method for users to access JumpCloud-protected resources from a managed device.<\/p>\n","checkmark_list":[{"list_item":"Blog Post | <a href=https://jumpcloud.com/"https:////jumpcloud.com//blog//overview-of-cloud-ldap/">How Cloud LDAP Can Benefit Your Organization<\/a>"},{"list_item":"Support Article | <a href=https://jumpcloud.com/"https:////support.jumpcloud.com//s//article//configuring-your-wifi-clients-to-use-jumpcloud-radius1-2019-08-21-10-36-47/">Configuring your WiFi Clients to use JumpCloud RADIUS<\/a>"},{"list_item":"Blog Post | <a href=https://jumpcloud.com/"https:////jumpcloud.com//blog//jumpcloud-go-passwordless-login-experience/">Elevate Security and the Employee Experience with JumpCloud Go\u2122<\/a>"}],"cta":{"copy":"","url":"","target":false}}}]"
>