All in one
Deal with identity governance, credential management or entitlement management at once. MidPoint offers you a large range of useful features which is growing constantly.
MidPoint can adapt to various needs of large range of enterprises. Small or big organizations, numerous industries.
As a second-generation IDM system, midPoint is built as an improvement of first-generation systems. It is the most comprehensive open IDM system available on the market.
Now when we are familiar with GDPR principles and Rights of data subjects it is time to move on and uncover the content and territorial reach of GDPR. We will explain what data, systems and persons are protected by GDPR and who is bound to do so. GDPR applies to all contexts across all sectors.[…]
Identity connectors are important part of any identity management (IDM) project. For an IDM solution the connector provide interface to the outer world. And there are few connectors that almost any IDM solution needs: LDAP, Active Directory and CSV. New versions of those connectors were released recently. And there is an interesting story behind those[…]
This article is the last continuation of the GDPR principles series. In the previous articles you could read about the purpose limitation principle and data minimisation or accurancy and data retention periods. Now let’s learn about data security and Accountability. Data security Controllers are responsible for ensuring that personal data are kept secure, against both external and internal threats. This[…]
Last article was devoted to the principles concerning controller’s duties. On contrary, today’s principles will express what data subjects may call for. Accuracy Personal data must be accurate and kept up to date, in other way it should be deleted or amended. So far nothing new in comparison with the Directive. The controllers must make[…]
Today we will continue discovering GDPR principles by giving attention to two new principles introduced by GDPR. Both of them seem to be burdensome and restrictive for controllers, presenting their new duties and restraints. The purpose limitation principle The purpose limitation principle says the personal data collected for one purpose should not be used for[…]
General data protection regulation (GDPR) is all about good management of identity data. And that is exactly what identity management (IDM) technologies do. Also, it is unlikely that GDPR compliance can be effectively implemented without any support from the technology. And that’s where IDM systems come in again. Overall, IDM technologies are almost perfect fit[…]