Unicon: Authenticating Into MidPoint With SSO

Unicon is a professional services company with over 30 years of experience in educational technology, specializing in integrations, development, and identity governance and administration. As Evolveum’s Gold Partner, Unicon has led numerous engagements in implementing and supporting midPoint installations for various educational institutions. In this session, David Mendez, Unicon’s Senior Director of Critical Infrastructure, and Read more about Unicon: Authenticating Into MidPoint With SSO[…]

MidPoint 4.9 “Verne” Update 1 Released

MidPoint 4.9, code-named “Verne”, was released in October 2024. Similar to Verne’s novels, it brings several technological advancements. You can look forward to significant improvements in role mining and the first version of outlier detection. Moreover, midPoint 4.9 focuses on streamlining entitlement management, which is described in detail in a new methodology and backed up Read more about MidPoint 4.9 “Verne” Update 1 Released[…]

IdentiBeer: Where Great Identity Minds Connect

This month, I had the pleasure of attending an IdentiBeer event — a friendly, casual meeting of identity professionals. IdentiBeer is organized in various cities around the world, and I had the opportunity to attend two of them in one week. The first one was in London, and the second one was the day after Read more about IdentiBeer: Where Great Identity Minds Connect[…]

DAASI International: MidPoint and SCIM Webinar Summary

DAASI International: MidPoint and SCIM Webinar Summary

DAASI International specializes in identity and access management systems while using open source solutions. As strong advocates for open standards, they prioritize standard-based approaches in their projects to integrate systems effectively. The modern and widely adopted SCIM (System for Cross-domain Identity Management) standard is particularly beneficial for cloud system integration. To facilitate the integration of Read more about DAASI International: MidPoint and SCIM Webinar Summary[…]

Securing Access: The Power of Access Certification in IGA Webinar Summary

Maintaining up-to-date user access rights is a paramount security challenge. Changes in the organizational structure, the transfer of users to other departments, changes in security policies, and other transformational processes within a company require the reassessment of the existing access rights. A regular review of user access is a key element of an effective access Read more about Securing Access: The Power of Access Certification in IGA Webinar Summary[…]

Inalogy: Keycloak as an Access Layer Webinar Summary

From the very beginning, Inalogy has been aiming to deliver comprehensive identity and access management systems. MidPoint fits perfectly as a core IGA component, and Keycloak supports it in providing access management capabilities. In our recent “Keycloak as an Access Layer” webinar from the MidPoint Integrations: Partner Series, Ján Marcin, Inalogy’s Chief Operations Officer, explained Read more about Inalogy: Keycloak as an Access Layer Webinar Summary[…]

Group Management with MidPoint Webinar Summary

The identity governance and administration world is not just about identities and their accounts. It is also about their access rights, e.g., group membership. But how can midPoint adopt the existing access rights, present them as roles, and start managing them? What if midPoint is not allowed to manage some groups at a given time Read more about Group Management with MidPoint Webinar Summary[…]

Role Mining in MidPoint Webinar Summary

On September 26, 2024, we held a webinar focused on the role mining feature in midPoint that is designed to help organizations optimize access control by revealing hidden business information. This webinar explored role mining as a solution to common challenges, such as over-permissioning, the lack of insight into access rights, and role explosion that Read more about Role Mining in MidPoint Webinar Summary[…]

Happy Halloween From Evolveum

Identity management and identity governance might feel straightforward – until things go terribly wrong. This Halloween, we’re sharing five bone-chilling tales that IT teams everywhere can relate to. From ghosts in the system to a zombie outbreak of lingering access permissions, these stories reveal just how quickly things can spiral when situations take a dark Read more about Happy Halloween From Evolveum[…]

Atricore: Enhancing Security through MidPoint and SIEM Integration Webinar Summary

We organized another webinar from the MidPoint Integrations: Partner Series, featuring our partner Atricore and Wazuh! Atricore’s CTO Sebastián Gonzalez Oyuela, their CEO Gianluca Brigandi, and Wazuh’s IT Security Engineer Gerardo David Caceres Fleitas explored how integrating midPoint with the OSS SIEM Wazuh enhances security, streamlines IGA, and ensures regulatory compliance. The presentation included a Read more about Atricore: Enhancing Security through MidPoint and SIEM Integration Webinar Summary[…]