Inalogy: Keycloak as an Access Layer Webinar Summary

From the very beginning, Inalogy has been aiming to deliver comprehensive identity and access management systems. MidPoint fits perfectly as a core IGA component, and Keycloak supports it in providing access management capabilities. In our recent “Keycloak as an Access Layer” webinar from the MidPoint Integrations: Partner Series, Ján Marcin, Inalogy’s Chief Operations Officer, explained Read more about Inalogy: Keycloak as an Access Layer Webinar Summary[…]

Group Management with MidPoint Webinar Summary

The identity governance and administration world is not just about identities and their accounts. It is also about their access rights, e.g., group membership. But how can midPoint adopt the existing access rights, present them as roles, and start managing them? What if midPoint is not allowed to manage some groups at a given time Read more about Group Management with MidPoint Webinar Summary[…]

Happy Halloween From Evolveum

Identity management and identity governance might feel straightforward – until things go terribly wrong. This Halloween, we’re sharing five bone-chilling tales that IT teams everywhere can relate to. From ghosts in the system to a zombie outbreak of lingering access permissions, these stories reveal just how quickly things can spiral when situations take a dark Read more about Happy Halloween From Evolveum[…]

Atricore: Enhancing Security through MidPoint and SIEM Integration Webinar Summary

We organized another webinar from the MidPoint Integrations: Partner Series, featuring our partner Atricore and Wazuh! Atricore’s CTO Sebastián Gonzalez Oyuela, their CEO Gianluca Brigandi, and Wazuh’s IT Security Engineer Gerardo David Caceres Fleitas explored how integrating midPoint with the OSS SIEM Wazuh enhances security, streamlines IGA, and ensures regulatory compliance. The presentation included a Read more about Atricore: Enhancing Security through MidPoint and SIEM Integration Webinar Summary[…]

AMI Praha: SAP SuccessFactors HR Webinar Summary

We organized a webinar within our MidPoint Integrations: Partner Series iniciative, led by AMI Praha‘s Chief Solution Architect, Martin Lízner, where you could explore Fortuna Entertainment Group’s shift from an on-premise HR system to an SAP SuccessFactors cloud solution thanks to midPoint. Martin explained how AMI Praha integrated this new HR system into their existing Read more about AMI Praha: SAP SuccessFactors HR Webinar Summary[…]

MidPoint Intermediate Training Teaser Webinar Summary

MidPoint is a comprehensive, feature-rich identity management and governance platform. Since the beginning, the major task of midPoint customization has been configuring midPoint behavior. This includes the preparation of schema handling, mapping, object templates, and more. If you follow our First Steps Methodology, you can manage the configuration entirely in the GUI, but there are Read more about MidPoint Intermediate Training Teaser Webinar Summary[…]

Securing MidPoint Deployments Webinar Summary

The security of deployments and applications is becoming increasingly important, and many organizations need to increase the security of their applications. The webinar on April 04, 2024, was an overview and refresher on various configuration and deployment aspects regarding security – from the initial installation and configuration, expressions, scripting, various recommendations when using Self Registration, Read more about Securing MidPoint Deployments Webinar Summary[…]

MidPoint’s First Steps Methodology

MidPoint is a comprehensive, feature-rich identity management and governance platform. Since its beginnings, it was meant to be very flexible and customizable via configuration to allow various types of deployments. The flexibility, however, also brings complexity. Deployment challenges were often caused by the systems being integrated and their identity data. Even if midPoint features are Read more about MidPoint’s First Steps Methodology[…]

MidPoint as Part of the Complex IT Landscape

Digital transformation and evolution introduced new processes to businesses, and even the existing processes have become more complex and interconnected throughout companies’ infrastructures. In a regulatory controlled environment, there are additional information security requirements together with legal and compliance policies resulting in even more complex processes and workflows. One of the most important factors for Read more about MidPoint as Part of the Complex IT Landscape[…]

Customizing GUI Webinar Summary

Customizing GUI Webinar Summary

MidPoint 4.4 called Tesla has been released in late November. Tesla includes a lot of different improvements, mainly regarding scalability, such as the new repository implementation or tasks improvements. During the Tesla development, we also invested time to re-design the graphical user interface. We wanted to bring better UX and more customization options. During the Read more about Customizing GUI Webinar Summary[…]