{"id":10621,"date":"2019-06-06T05:22:59","date_gmt":"2019-06-06T10:22:59","guid":{"rendered":"https:\/\/www.praim.com\/?p=10621"},"modified":"2023-01-17T16:49:43","modified_gmt":"2023-01-17T15:49:43","slug":"how-to-provide-a-secure-access-to-vdi-environments-with-thinman-smart-identity","status":"publish","type":"post","link":"https:\/\/www.praim.com\/en\/news\/how-to-provide-a-secure-access-to-vdi-environments-with-thinman-smart-identity\/","title":{"rendered":"How to provide a secure access to VDI environments with ThinMan Smart Identity"},"content":{"rendered":"<p style=\"text-align: justify;\">With breach after breach making headlines today as well as various cybersecurity incidents being reported in unprecedented numbers, businesses today are having to rethink their security architecture. The security of environments includes considering how end users are able to access business-critical systems. <strong>Generally speaking, user access is assigned based on identity<\/strong>. Identity is the mechanism of validating that someone is who they say they are. Time and again, it is found that traditional means of securing resources is quickly becoming outdated and easily compromised by attackers. These security concerns are present across both full end user clients as well as VDI thin client devices. Why are traditional means of security simply not enough in today\u2019s world of growing cybersecurity threats?\u00a0 How can organizations engineer simple and secure access to company resources and still ensure the security of systems and data? Let\u2019s take a look at how Praim\u2019s <a href=\"https:\/\/www.praim.com\/en\/products\/software\/thinman_smart_identity\/\"><strong>Smart Identity<\/strong><\/a> with Agile 2.6.1 is able to <strong>provide this simple and secure access to resources effectively and efficiently<\/strong>.<\/p>\n<h3>Why Traditional Identity is Failing Organizations<\/h3>\n<p style=\"text-align: justify;\">Establishing identity plays perhaps the most crucial part in security for end users accessing valuable company resources. Based on identity, users are granted permissions or assigned roles that determine their overall abilities to access files, folders, or other data stored. Attackers most often look for the \u201clow hanging fruit\u201d for security compromise. Often, this involves compromising user credentials to gain unauthorized access to sensitive or otherwise critical data. What do attackers often look for? <strong>Weak Passwords<\/strong>.<\/p>\n<p style=\"text-align: justify;\">Traditional security involving the classic username and password is failing to secure today\u2019s data. Many end users, including high-level access users with dangerous access permissions, are using weak passwords for their accounts. Why is this the case? Weak passwords are easy to remember. Humans are generally creatures of least resistance and effort. Many end users do not want the extra hassle of remembering a complex password and having to periodically change their password to yet another complex password. This leads end users to simply change a single character or add a different number to a very weak password that barely satisfies any complexity or password requirements.<\/p>\n<p style=\"text-align: justify;\">These types of habits by end users creates a massive security vulnerability in the username and passwords themselves. Many users use easily guessable passwords that are common words found in a dictionary. <strong>Attackers sometimes use what is called \u201cdictionary attacks\u201d<\/strong> to gain access to systems by using automated tools to try hundreds or even thousands of passwords against a number of accounts to try to guess the password of end users. More often than not, they can find an account of a user who is using a very weak password that is easily \u201cguessed\u201d using one of these automated tools.<\/p>\n<p style=\"text-align: justify;\">Other scams and tactics of attackers can also prove extremely fruitful. This includes <strong>phishing<\/strong> attacks that can trick end users into disclosing their credentials in some way. As basic and \u201cold school\u201d as the technique of phishing is, the technology presented to end users by way of websites and emails have gotten much more sophisticated and can easily pass as legitimate requests for information to the unsuspecting and untrained eye.<\/p>\n<h3>Strong Security Requires Multi-Factor Authentication<\/h3>\n<p style=\"text-align: justify;\">When looking at ways to bolster the security of \u201cidentity\u201d, <strong>multi-factor and also smart card or similar authentication are tremendously powerful<\/strong>. With smart card authentication, you have a physical \u201ctoken\u201d such as a smart card that you possess which the user has to physically possess to login to their end user system. With multi-factor authentication, a user has to know a piece of information which is their password but they also have to physically possess the token that completes the chain of authentication required for accessing the system.<\/p>\n<p style=\"text-align: justify;\">If an attacker steals the user\u2019s credentials including their password, they still do not possess the full circle of security information needed to complete the authentication request as the true end user still possesses the physical token required for authentication.<\/p>\n<p style=\"text-align: justify;\">Verifying identity <strong>applies as well with VDI<\/strong> <strong>technologies<\/strong> to allow users to gain access to the VDI infrastructure. Many organizations may shy away from configuring multi-factor or other smart token access due to the complexity of configuring the extra security.<\/p>\n<h3>Praim Smart Identity \u2013 Simple and Secure Access<\/h3>\n<p style=\"text-align: justify;\"><strong>Praim\u2019s Smart Identity solution works in harmony with <a href=\"https:\/\/www.praim.com\/products\/software\/agile4pc\/\">Praim Agile<\/a> to provide a simple, secure, and seamless solution for providing more secure access to VDI environments<\/strong>. It is designed to work with many smart cards and readers: both with physical reading of the card through insertion (contact), and with proximity card with NFC (contactless) technology. Smart Identity allows you to enable different types of access and security, in a granular way, with total control of both users and authentication methods used.<\/p>\n<p style=\"text-align: justify;\">The enrollment process is totally under control of the administrator, who decides which devices could enroll the smart cards, how many cards a user can enable, as well as decide to block unwanted devices and smart cards.<\/p>\n<p style=\"text-align: justify;\">Praim Smart Identity can be configured in <strong>two configurations<\/strong> for authenticating end users to VDI environments:<\/p>\n<ul>\n<li style=\"text-align: justify;\">Authentication Device<\/li>\n<li style=\"text-align: justify;\">Identification Device with Multi-Factor<\/li>\n<\/ul>\n<div id=\"attachment_10623\" style=\"width: 485px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" aria-describedby=\"caption-attachment-10623\" class=\"lazyload wp-image-10623 size-full\" src=\"https:\/\/www.praim.com\/wp-content\/uploads\/2019\/06\/Smart-Identity_screen.png\" data-orig-src=\"https:\/\/www.praim.com\/wp-content\/uploads\/2019\/06\/Smart-Identity_screen.png\" alt=\"Smart Identity_screen\" width=\"475\" height=\"344\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27475%27%20height%3D%27344%27%20viewBox%3D%270%200%20475%20344%27%3E%3Crect%20width%3D%27475%27%20height%3D%27344%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.praim.com\/wp-content\/uploads\/2019\/06\/Smart-Identity_screen-200x145.png 200w, https:\/\/www.praim.com\/wp-content\/uploads\/2019\/06\/Smart-Identity_screen-300x217.png 300w, https:\/\/www.praim.com\/wp-content\/uploads\/2019\/06\/Smart-Identity_screen-400x290.png 400w, https:\/\/www.praim.com\/wp-content\/uploads\/2019\/06\/Smart-Identity_screen.png 475w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 475px) 100vw, 475px\" \/><p id=\"caption-attachment-10623\" class=\"wp-caption-text\">Praim Smart Identity<\/p><\/div>\n<p>When using <strong>Praim ThinMan Smart Identity as an authentication device<\/strong>, a smart physical device is used such as a smart card for authentication. In this configuration mode, there is no need for a password to be entered from the end user as the smart device takes care of the complete authentication mechanism. The workflow for the authentication process includes the following:<\/p>\n<ol>\n<li>Praim ThinMan Smart Identity validates whether the smart card is active<\/li>\n<li>User Access is granted to the device and its resources<\/li>\n<li>Device or user profiles are applied from ThinMan server<\/li>\n<li>When the user is finished, tapping the card or removing it from the reader will lock or log the session out from the device.<\/li>\n<\/ol>\n<p><img decoding=\"async\" class=\"lazyload aligncenter wp-image-10624 size-full\" src=\"https:\/\/www.praim.com\/wp-content\/uploads\/2019\/06\/Smart-Identity_hardware.png\" data-orig-src=\"https:\/\/www.praim.com\/wp-content\/uploads\/2019\/06\/Smart-Identity_hardware.png\" alt=\"Smart Identity_hardware\" width=\"445\" height=\"303\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27445%27%20height%3D%27303%27%20viewBox%3D%270%200%20445%20303%27%3E%3Crect%20width%3D%27445%27%20height%3D%27303%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.praim.com\/wp-content\/uploads\/2019\/06\/Smart-Identity_hardware-200x136.png 200w, https:\/\/www.praim.com\/wp-content\/uploads\/2019\/06\/Smart-Identity_hardware-300x204.png 300w, https:\/\/www.praim.com\/wp-content\/uploads\/2019\/06\/Smart-Identity_hardware-400x272.png 400w, https:\/\/www.praim.com\/wp-content\/uploads\/2019\/06\/Smart-Identity_hardware.png 445w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 445px) 100vw, 445px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">Using <strong>Praim ThinMan Smart Identity in the identification device<\/strong> mode, the smart card is used to identify the user, then a second-factor authentication mechanism such as a PIN or domain password is used to authenticate the user to the device. The authentication workflow for the end user in this mode includes the following:<\/p>\n<ol style=\"text-align: justify;\">\n<li>User presents the identification device<\/li>\n<li>Praim ThinMan server checks to see if the smart card is active and recognized<\/li>\n<li>If recognized, a second-factor authentication mechanism is prompted<\/li>\n<li>If the PIN or domain password is validated, the user session is granted access to the device and its resources<\/li>\n<li>ThinMan device and user profiles are applied<\/li>\n<\/ol>\n<p style=\"text-align: justify;\">Organizations are looking for simple, yet secure technology solutions to solve the very complex and intricate challenges of today\u2019s digital landscapes as indicated by Praim\u2019s Chief Sales Officer, Stefano Bonmassar:<\/p>\n<p style=\"text-align: justify;\">&#8220;<em>The digitalization of processes must guarantee\u00a0<\/em><strong><em>simplicity, transparency<\/em><\/strong><em>, but at the <\/em><em>same time\u00a0<strong>high security and service continuity<\/strong>, for this reason technological choices are very important.<\/em>&#8220;<\/p>\n<p style=\"text-align: justify;\">Recently, Praim released version 2.6.1 of Agile sporting the Smart Identity technology. Agile with Smart Identity has some really great new features to speak of in this release. This includes the new ability to <strong>pass credentials used to login to ThinMan to the Windows Credential Manager<\/strong>. Praim automates this process with the following:<\/p>\n<ul style=\"text-align: justify;\">\n<li>Credentials are stored in Windows Credential Manager<\/li>\n<li>These are automatically removed when the logoff process is initiated or when the smart card is removed<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">This gives IT administrators more flexibility with scripting and other mechanisms to mount network drives, network printers, or other devices using credentials passed on to Windows from ThinMan Server.<\/p>\n<h3 style=\"text-align: justify;\">Concluding Thoughts<\/h3>\n<p style=\"text-align: justify;\">Praim\u2019s Smart Identity solution is a simple and secure way to access resources. It allows companies to manage smart token devices and multi-factor access easily. By implementing the Smart Identity solution, businesses are able to transition from the legacy methods of username and passwords to the modern and more secure approach of token-based access to VDI environments.<\/p>\n<h3 style=\"text-align: justify;\">Be sure to <a href=\"https:\/\/www.praim.com\/en\/products\/software\/thinman_smart_identity\/\"><strong>check out Praim Smart Identity<\/strong><\/a> in conjunction with <a href=\"https:\/\/www.praim.com\/products\/software\/thinman\/\"><strong>ThinMan Server<\/strong><\/a> to achieve the ultimate in VDI management, security, simplicity.<\/h3>\n","protected":false},"excerpt":{"rendered":"<p>With breach after breach making headlines today as  &#8230;<\/p>\n","protected":false},"author":18,"featured_media":10620,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[517],"tags":[],"class_list":["post-10621","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-archive"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to provide a secure access to VDI environments with ThinMan Smart Identity &#8211; Praim<\/title>\n<meta name=\"description\" content=\"Praim\u2019s Smart Identity solution is a simple and secure way to access resources. It allows companies to manage smart token devices and multi-factor access easily.\" \/>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to provide a secure access to VDI environments with ThinMan Smart Identity &#8211; Praim\" \/>\n<meta property=\"og:description\" content=\"Praim\u2019s Smart Identity solution is a simple and secure way to access resources. It allows companies to manage smart token devices and multi-factor access easily.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.praim.com\/en\/news\/how-to-provide-a-secure-access-to-vdi-environments-with-thinman-smart-identity\/\" \/>\n<meta property=\"og:site_name\" content=\"Praim\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-06T10:22:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-17T15:49:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.praim.com\/wp-content\/uploads\/2019\/06\/20190404_103725.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"843\" \/>\n\t<meta property=\"og:image:height\" content=\"337\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Brandon Lee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brandon Lee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.praim.com\\\/en\\\/news\\\/how-to-provide-a-secure-access-to-vdi-environments-with-thinman-smart-identity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.praim.com\\\/en\\\/news\\\/how-to-provide-a-secure-access-to-vdi-environments-with-thinman-smart-identity\\\/\"},\"author\":{\"name\":\"Brandon Lee\",\"@id\":\"https:\\\/\\\/www.praim.com\\\/en\\\/#\\\/schema\\\/person\\\/1edd80d87c98c34ff2392ba8190fc11f\"},\"headline\":\"How to provide a secure access to VDI environments with ThinMan Smart Identity\",\"datePublished\":\"2019-06-06T10:22:59+00:00\",\"dateModified\":\"2023-01-17T15:49:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.praim.com\\\/en\\\/news\\\/how-to-provide-a-secure-access-to-vdi-environments-with-thinman-smart-identity\\\/\"},\"wordCount\":1340,\"publisher\":{\"@id\":\"https:\\\/\\\/www.praim.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.praim.com\\\/en\\\/news\\\/how-to-provide-a-secure-access-to-vdi-environments-with-thinman-smart-identity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.praim.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/20190404_103725.jpg\",\"articleSection\":[\"Archive\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.praim.com\\\/en\\\/news\\\/how-to-provide-a-secure-access-to-vdi-environments-with-thinman-smart-identity\\\/\",\"url\":\"https:\\\/\\\/www.praim.com\\\/en\\\/news\\\/how-to-provide-a-secure-access-to-vdi-environments-with-thinman-smart-identity\\\/\",\"name\":\"How to provide a secure access to VDI environments with ThinMan Smart Identity &#8211; Praim\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.praim.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.praim.com\\\/en\\\/news\\\/how-to-provide-a-secure-access-to-vdi-environments-with-thinman-smart-identity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.praim.com\\\/en\\\/news\\\/how-to-provide-a-secure-access-to-vdi-environments-with-thinman-smart-identity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.praim.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/20190404_103725.jpg\",\"datePublished\":\"2019-06-06T10:22:59+00:00\",\"dateModified\":\"2023-01-17T15:49:43+00:00\",\"description\":\"Praim\u2019s Smart Identity solution is a simple and secure way to access resources. It allows companies to manage smart token devices and multi-factor access easily.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.praim.com\\\/en\\\/news\\\/how-to-provide-a-secure-access-to-vdi-environments-with-thinman-smart-identity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.praim.com\\\/en\\\/news\\\/how-to-provide-a-secure-access-to-vdi-environments-with-thinman-smart-identity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.praim.com\\\/en\\\/news\\\/how-to-provide-a-secure-access-to-vdi-environments-with-thinman-smart-identity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.praim.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/20190404_103725.jpg\",\"contentUrl\":\"https:\\\/\\\/www.praim.com\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/20190404_103725.jpg\",\"width\":843,\"height\":337,\"caption\":\"Smart Identity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.praim.com\\\/en\\\/news\\\/how-to-provide-a-secure-access-to-vdi-environments-with-thinman-smart-identity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.praim.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to provide a secure access to VDI environments with ThinMan Smart Identity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.praim.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.praim.com\\\/en\\\/\",\"name\":\"Praim\",\"description\":\"Smart Access to your Cloud\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.praim.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.praim.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.praim.com\\\/en\\\/#organization\",\"name\":\"Praim srl\",\"url\":\"https:\\\/\\\/www.praim.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.praim.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.praim.com\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/praim-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.praim.com\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/praim-logo.png\",\"width\":230,\"height\":230,\"caption\":\"Praim srl\"},\"image\":{\"@id\":\"https:\\\/\\\/www.praim.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.praim.com\\\/en\\\/#\\\/schema\\\/person\\\/1edd80d87c98c34ff2392ba8190fc11f\",\"name\":\"Brandon Lee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/53bf83ca31e650ec12ea900c1634e8fbed1b61d8a2022ac408c9f1cabb5736ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/53bf83ca31e650ec12ea900c1634e8fbed1b61d8a2022ac408c9f1cabb5736ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/53bf83ca31e650ec12ea900c1634e8fbed1b61d8a2022ac408c9f1cabb5736ed?s=96&d=mm&r=g\",\"caption\":\"Brandon Lee\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to provide a secure access to VDI environments with ThinMan Smart Identity &#8211; Praim","description":"Praim\u2019s Smart Identity solution is a simple and secure way to access resources. It allows companies to manage smart token devices and multi-factor access easily.","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"en_US","og_type":"article","og_title":"How to provide a secure access to VDI environments with ThinMan Smart Identity &#8211; Praim","og_description":"Praim\u2019s Smart Identity solution is a simple and secure way to access resources. It allows companies to manage smart token devices and multi-factor access easily.","og_url":"https:\/\/www.praim.com\/en\/news\/how-to-provide-a-secure-access-to-vdi-environments-with-thinman-smart-identity\/","og_site_name":"Praim","article_published_time":"2019-06-06T10:22:59+00:00","article_modified_time":"2023-01-17T15:49:43+00:00","og_image":[{"width":843,"height":337,"url":"https:\/\/www.praim.com\/wp-content\/uploads\/2019\/06\/20190404_103725.jpg","type":"image\/jpeg"}],"author":"Brandon Lee","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Brandon Lee","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.praim.com\/en\/news\/how-to-provide-a-secure-access-to-vdi-environments-with-thinman-smart-identity\/#article","isPartOf":{"@id":"https:\/\/www.praim.com\/en\/news\/how-to-provide-a-secure-access-to-vdi-environments-with-thinman-smart-identity\/"},"author":{"name":"Brandon Lee","@id":"https:\/\/www.praim.com\/en\/#\/schema\/person\/1edd80d87c98c34ff2392ba8190fc11f"},"headline":"How to provide a secure access to VDI environments with ThinMan Smart Identity","datePublished":"2019-06-06T10:22:59+00:00","dateModified":"2023-01-17T15:49:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.praim.com\/en\/news\/how-to-provide-a-secure-access-to-vdi-environments-with-thinman-smart-identity\/"},"wordCount":1340,"publisher":{"@id":"https:\/\/www.praim.com\/en\/#organization"},"image":{"@id":"https:\/\/www.praim.com\/en\/news\/how-to-provide-a-secure-access-to-vdi-environments-with-thinman-smart-identity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.praim.com\/wp-content\/uploads\/2019\/06\/20190404_103725.jpg","articleSection":["Archive"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.praim.com\/en\/news\/how-to-provide-a-secure-access-to-vdi-environments-with-thinman-smart-identity\/","url":"https:\/\/www.praim.com\/en\/news\/how-to-provide-a-secure-access-to-vdi-environments-with-thinman-smart-identity\/","name":"How to provide a secure access to VDI environments with ThinMan Smart Identity &#8211; Praim","isPartOf":{"@id":"https:\/\/www.praim.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.praim.com\/en\/news\/how-to-provide-a-secure-access-to-vdi-environments-with-thinman-smart-identity\/#primaryimage"},"image":{"@id":"https:\/\/www.praim.com\/en\/news\/how-to-provide-a-secure-access-to-vdi-environments-with-thinman-smart-identity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.praim.com\/wp-content\/uploads\/2019\/06\/20190404_103725.jpg","datePublished":"2019-06-06T10:22:59+00:00","dateModified":"2023-01-17T15:49:43+00:00","description":"Praim\u2019s Smart Identity solution is a simple and secure way to access resources. It allows companies to manage smart token devices and multi-factor access easily.","breadcrumb":{"@id":"https:\/\/www.praim.com\/en\/news\/how-to-provide-a-secure-access-to-vdi-environments-with-thinman-smart-identity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.praim.com\/en\/news\/how-to-provide-a-secure-access-to-vdi-environments-with-thinman-smart-identity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.praim.com\/en\/news\/how-to-provide-a-secure-access-to-vdi-environments-with-thinman-smart-identity\/#primaryimage","url":"https:\/\/www.praim.com\/wp-content\/uploads\/2019\/06\/20190404_103725.jpg","contentUrl":"https:\/\/www.praim.com\/wp-content\/uploads\/2019\/06\/20190404_103725.jpg","width":843,"height":337,"caption":"Smart Identity"},{"@type":"BreadcrumbList","@id":"https:\/\/www.praim.com\/en\/news\/how-to-provide-a-secure-access-to-vdi-environments-with-thinman-smart-identity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.praim.com\/en\/"},{"@type":"ListItem","position":2,"name":"How to provide a secure access to VDI environments with ThinMan Smart Identity"}]},{"@type":"WebSite","@id":"https:\/\/www.praim.com\/en\/#website","url":"https:\/\/www.praim.com\/en\/","name":"Praim","description":"Smart Access to your Cloud","publisher":{"@id":"https:\/\/www.praim.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.praim.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.praim.com\/en\/#organization","name":"Praim srl","url":"https:\/\/www.praim.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.praim.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.praim.com\/wp-content\/uploads\/2019\/12\/praim-logo.png","contentUrl":"https:\/\/www.praim.com\/wp-content\/uploads\/2019\/12\/praim-logo.png","width":230,"height":230,"caption":"Praim srl"},"image":{"@id":"https:\/\/www.praim.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.praim.com\/en\/#\/schema\/person\/1edd80d87c98c34ff2392ba8190fc11f","name":"Brandon Lee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/53bf83ca31e650ec12ea900c1634e8fbed1b61d8a2022ac408c9f1cabb5736ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/53bf83ca31e650ec12ea900c1634e8fbed1b61d8a2022ac408c9f1cabb5736ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/53bf83ca31e650ec12ea900c1634e8fbed1b61d8a2022ac408c9f1cabb5736ed?s=96&d=mm&r=g","caption":"Brandon Lee"}}]}},"_links":{"self":[{"href":"https:\/\/www.praim.com\/en\/wp-json\/wp\/v2\/posts\/10621","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.praim.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.praim.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.praim.com\/en\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.praim.com\/en\/wp-json\/wp\/v2\/comments?post=10621"}],"version-history":[{"count":5,"href":"https:\/\/www.praim.com\/en\/wp-json\/wp\/v2\/posts\/10621\/revisions"}],"predecessor-version":[{"id":10806,"href":"https:\/\/www.praim.com\/en\/wp-json\/wp\/v2\/posts\/10621\/revisions\/10806"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.praim.com\/en\/wp-json\/wp\/v2\/media\/10620"}],"wp:attachment":[{"href":"https:\/\/www.praim.com\/en\/wp-json\/wp\/v2\/media?parent=10621"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.praim.com\/en\/wp-json\/wp\/v2\/categories?post=10621"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.praim.com\/en\/wp-json\/wp\/v2\/tags?post=10621"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}