Unicon: Authenticating Into MidPoint With SSO

Unicon is a professional services company with over 30 years of experience in educational technology, specializing in integrations, development, and identity governance and administration. As Evolveum’s Gold Partner, Unicon has led numerous engagements in implementing and supporting midPoint installations for various educational institutions. In this session, David Mendez, Unicon’s Senior Director of Critical Infrastructure, and Read more about Unicon: Authenticating Into MidPoint With SSO[…]

Inalogy: Keycloak as an Access Layer Webinar Summary

From the very beginning, Inalogy has been aiming to deliver comprehensive identity and access management systems. MidPoint fits perfectly as a core IGA component, and Keycloak supports it in providing access management capabilities. In our recent “Keycloak as an Access Layer” webinar from the MidPoint Integrations: Partner Series, Ján Marcin, Inalogy’s Chief Operations Officer, explained Read more about Inalogy: Keycloak as an Access Layer Webinar Summary[…]

Group Management with MidPoint Webinar Summary

The identity governance and administration world is not just about identities and their accounts. It is also about their access rights, e.g., group membership. But how can midPoint adopt the existing access rights, present them as roles, and start managing them? What if midPoint is not allowed to manage some groups at a given time Read more about Group Management with MidPoint Webinar Summary[…]

Happy Halloween From Evolveum

Identity management and identity governance might feel straightforward – until things go terribly wrong. This Halloween, we’re sharing five bone-chilling tales that IT teams everywhere can relate to. From ghosts in the system to a zombie outbreak of lingering access permissions, these stories reveal just how quickly things can spiral when situations take a dark Read more about Happy Halloween From Evolveum[…]

Atricore: Enhancing Security through MidPoint and SIEM Integration Webinar Summary

We organized another webinar from the MidPoint Integrations: Partner Series, featuring our partner Atricore and Wazuh! Atricore’s CTO Sebastián Gonzalez Oyuela, their CEO Gianluca Brigandi, and Wazuh’s IT Security Engineer Gerardo David Caceres Fleitas explored how integrating midPoint with the OSS SIEM Wazuh enhances security, streamlines IGA, and ensures regulatory compliance. The presentation included a Read more about Atricore: Enhancing Security through MidPoint and SIEM Integration Webinar Summary[…]

AMI Praha: SAP SuccessFactors HR Webinar Summary

We organized a webinar within our MidPoint Integrations: Partner Series iniciative, led by AMI Praha‘s Chief Solution Architect, Martin Lízner, where you could explore Fortuna Entertainment Group’s shift from an on-premise HR system to an SAP SuccessFactors cloud solution thanks to midPoint. Martin explained how AMI Praha integrated this new HR system into their existing Read more about AMI Praha: SAP SuccessFactors HR Webinar Summary[…]

MidPoint Intermediate Training Teaser Webinar Summary

MidPoint is a comprehensive, feature-rich identity management and governance platform. Since the beginning, the major task of midPoint customization has been configuring midPoint behavior. This includes the preparation of schema handling, mapping, object templates, and more. If you follow our First Steps Methodology, you can manage the configuration entirely in the GUI, but there are Read more about MidPoint Intermediate Training Teaser Webinar Summary[…]

Securing MidPoint Deployments Webinar Summary

The security of deployments and applications is becoming increasingly important, and many organizations need to increase the security of their applications. The webinar on April 04, 2024, was an overview and refresher on various configuration and deployment aspects regarding security – from the initial installation and configuration, expressions, scripting, various recommendations when using Self Registration, Read more about Securing MidPoint Deployments Webinar Summary[…]

MidPoint’s First Steps Methodology

MidPoint is a comprehensive, feature-rich identity management and governance platform. Since its beginnings, it was meant to be very flexible and customizable via configuration to allow various types of deployments. The flexibility, however, also brings complexity. Deployment challenges were often caused by the systems being integrated and their identity data. Even if midPoint features are Read more about MidPoint’s First Steps Methodology[…]

MidPoint as Part of the Complex IT Landscape

Digital transformation and evolution introduced new processes to businesses, and even the existing processes have become more complex and interconnected throughout companies’ infrastructures. In a regulatory controlled environment, there are additional information security requirements together with legal and compliance policies resulting in even more complex processes and workflows. One of the most important factors for Read more about MidPoint as Part of the Complex IT Landscape[…]