The Old IDM Kings Are Dead. Long Live the New Kings.

It can be said that Identity Management (IDM) was born in early 2000s. That was the time when many people realized that a single big directory just won’t do it. They realized that something different was needed to bring order into the identity chaos. That was the dawn of a user provisioning system. Early market Read more about The Old IDM Kings Are Dead. Long Live the New Kings.[…]

Five Practical Ways to Ruin Your IAM Project

Identity and Access Management projects are very common nowadays. The interesting fact is that too many of them either vastly under-deliver or totally fail. I have been fighting in the IAM trenches for many long years and I have seen both successful and failed projects. It looks like to me that the IAM projects are Read more about Five Practical Ways to Ruin Your IAM Project[…]

IDM Antipatterns and Best Practice

All of us know it: ideas that sounds great but they fail miserably. It is a common sight almost everywhere. But during last few months I’ve heard an unusual number of such ideas related to the Identity and Access Management solutions. I know that veteran IAM practitioners are probably already well aware of them, but Read more about IDM Antipatterns and Best Practice[…]

Developing Newton

MidPoint has reached the state of a sophisticated open-source identity provisioning system. It has went through many releases and its provisioning and synchronization capabilities were gradually refined. MidPoint is currently the largest and most sophisticated open source identity provisioning system available on the market. It is as big as its two other competitors combined. And Read more about Developing Newton[…]