Securing Access: The Power of Access Certification in IGA Webinar Summary

Maintaining up-to-date user access rights is a paramount security challenge. Changes in the organizational structure, the transfer of users to other departments, changes in security policies, and other transformational processes within a company require the reassessment of the existing access rights. A regular review of user access is a key element of an effective access Read more about Securing Access: The Power of Access Certification in IGA Webinar Summary[…]

Testing Schrodinger Framework Webinar Summary

Testing Schrodinger Framework Webinar Summary

Schrodinger framework is a tool which is used for automated testing of the midPoint user interface. Schrodinger code is adopted exactly for midPoint project so with its help the tester can simulate midPoint user activities in a web browser. Starting from midPoint 4.3, Schrodinger framework was separated to a distinct project (previously it was a Read more about Testing Schrodinger Framework Webinar Summary[…]

A way to fight your fears or Self Service implementation

This is my story. Let me share it with you. When I heard abbreviation IDM at the first time, I understood nothing (IDM administrators, please, don’t laugh very loudly at this moment 🙂 And by the way, don’t read this post at all). Even when I heard the full definition of Identity Management I got the same Read more about A way to fight your fears or Self Service implementation[…]