Uncategorized Identity Geek Speak: ID Tokens – what are they? Have you ever wanted to know authentication works? Did you wonder what verifiable credentials are,…Alex VaystikhMay 25, 2023
Uncategorized How to Find Out What That Mysterious OAuth App Is If you are a Google Workspace administrator, you may have noticed some OAuth apps that…Alex VaystikhMay 11, 2023
Uncategorized Streamline Your Google Workspace: Decentralize Admin Tasks for Greater Efficiency and Productivity Are you still handling employee onboarding yourself? In our series "Unexpected Google Admins" (e.g. Amplify…Alex VaystikhApril 27, 2023
Uncategorized Employee offboarding: Google Workspace “Please come into my office,” the boss said. “Sit down. I have some bad news…”…Alex VaystikhApril 13, 2023
Uncategorized The Linus Tech Tips Hack: Don’t Be Next – Follow These Security Tips Apparently, Linus of Linus Tech Tips, a YouTube channel known for … uh tech tips…Alex VaystikhMarch 30, 2023
Uncategorized Should you trust your Mobile PIN? Should you trust your Mobile PIN? At YeshID, we are obsessed with making identity and…Alex VaystikhMarch 16, 2023
Uncategorized Tips on improving Google account management: contractor accounts & handling 2-step verification lock Previously, I’ve shown how to use Google Cloud Identity to create a Super Admin account…Alex VaystikhMarch 2, 2023
Uncategorized The adventures of super(er) google admin: reduce your attack surface for free! Hello, Super Admin If any of your Google Workspace Super Admin accounts are compromised, it…Alex VaystikhFebruary 16, 2023
Uncategorized The YeshID kitchen: where security and usability meet Identity and access management is a nuanced problem. Everyone hates it, and with good reason.…Alex VaystikhJanuary 27, 2023
Uncategorized Decentralized Verifiable Credentials for the future of Identity and Access Mangement Long long ago when people used “pay-phones” and listened to the music of our modems…Alex VaystikhJanuary 12, 2023