All in one
Deal with identity governance, credential management or entitlement management at once. MidPoint offers you a large range of useful features which is growing constantly.
MidPoint can adapt to various needs of large range of enterprises. Small or big organizations, numerous industries.
As a second-generation IDM system, midPoint is built as an improvement of first-generation systems. It is the most comprehensive open IDM system available on the market.
This year (2017) was full of training courses. Literally, there was almost no month without any training. Some took place in our office in Bratislava, Slovakia, some were remote/online sessions, but most of them were onsite, which meant a lot of travelling. I travelled to Canada and United States, later also to Finland. I experienced my first transatlantic flight,[…]
The first thing that most likely comes to the mind when people hear about GDPR is “consent”. That is understandable, as better part of the buzz around GDPR is about customer identities and digital marketing. But this emphasis on consumer identities is casting shadow on other aspects of GDPR that are at least as much[…]
Consent under the GDPR looks like really complex and complicated issue. Let’s see what we can already clearly explain. To achieve all stated requirements, you need to structure the consent granularly and give data subjects some options. Consent must be “specific”. Blanket consent without stating the exact purpose is not valid, but the GDPR does[…]
As we are getting closer to the practical side of processing personal data under the GDPR, firstly we need to understand the reason of processing expressed in lawful basis. The first and most discussed basis is obviously a consent. Today we will identify the nature, characteristics and features of the consent needed to process personal[…]
Now when we are familiar with GDPR principles and Rights of data subjects it is time to move on and uncover the content and territorial reach of GDPR. We will explain what data, systems and persons are protected by GDPR and who is bound to do so. GDPR applies to all contexts across all sectors.[…]
Identity connectors are important part of any identity management (IDM) project. For an IDM solution the connector provide interface to the outer world. And there are few connectors that almost any IDM solution needs: LDAP, Active Directory and CSV. New versions of those connectors were released recently. And there is an interesting story behind those[…]