MidPoint as Part of the Complex IT Landscape

Digital transformation and evolution introduced new processes to businesses, and even the existing processes have become more complex and interconnected throughout companies’ infrastructures. In a regulatory controlled environment, there are additional information security requirements together with legal and compliance policies resulting in even more complex processes and workflows. One of the most important factors for Read more about MidPoint as Part of the Complex IT Landscape[…]

Customizing GUI Webinar Summary

Customizing GUI Webinar Summary

MidPoint 4.4 called Tesla has been released in late November. Tesla includes a lot of different improvements, mainly regarding scalability, such as the new repository implementation or tasks improvements. During the Tesla development, we also invested time to re-design the graphical user interface. We wanted to bring better UX and more customization options. During the Read more about Customizing GUI Webinar Summary[…]

MidPoint 4.0.1 – Gutenberg Update 1

MidPoint 4.0.1 was released. It is a first update in a long-term support (LTS) release family code-named Gutenberg. There are many bugfixes and a handful of minor improvements. MidPoint 4.0.1 is a start of a long journey.

Archetypes in Gutenberg

MidPoint 4.0 “Gutenberg” is really a revolutionary midPoint release. It is a long-term support (LTS) release. But it also brings groundbreaking features. The support for archetypes is certainly one of those features that can be a real game-changer in the future. First part of this post told the story how the idea of archetypes evolved during the course of midPoint development. This part will describe how archetypes work and how they can be used. […]

Road To Archetypes

MidPoint is developed in evolutionary fashion. When we have started midPoint, many things were considered during the design. But we were not able to implement everything during early years of midPoint development. Therefore some ideas matured in the heads of midPoint developers until their time came. That is also the case of archetypes. The archetype functionality is one of the highlights of midPoint 4.0 “Gutenberg”. And this is the story how the idea of archetypes evolved during the course of midPoint development. […]

How to override administrative status

In my previous post, I wrote how to override full name if you don’t have actual data from HR in all cases. We can have a similar problem with a special property like Administrative status (user is enabled/disabled/archived). In most cases you already have done the mapping from HR. If the employee is active (or Read more about How to override administrative status[…]

Evolveum - How to override full name

How to override full name

You know, at the beginning every IDM project is clear and ideal. Everything seems to work well in the test environment, but as time goes by, the deadline is close and your customer finds more and more special cases. These cases have to be part of the solution “somehow” and “quickly” and of course they are found Read more about How to override full name[…]

Real life story of SCIMv1 and ConnId, Part 2

When our interconnection of various services by using midPoint, SCIMv1 protocol and Connid framework was ready, we proceeded to testing. While looking around for services supporting the SCIM protocol we stumbled upon two quite popular ones. Salesforce and Slack which both support the SCIM 1.1 specification but both on their own way with a couple of Read more about Real life story of SCIMv1 and ConnId, Part 2[…]

Real life story of SCIMv1 and ConnId, Part 1

When implementing a connector for the Midpoint identity management solution, there is a potential to interconnect a broad spectrum of services. Using the System for Cross-domain Identity Management (SCIM) protocol seems as a road to take. We are also working with the connId framework. It provides a means for building identity connectors in a more Read more about Real life story of SCIMv1 and ConnId, Part 1[…]

Simplifying LDAP Group Management Using MidPoint: Part II – Posix Groups

Unix/Linux servers can be configured to authenticate and authorize against LDAP server, by using LDAP accounts and groups. With some Identity Management solutions you can put users to these groups, but you need to manage the groups by the native LDAP tools. This is not the case with midPoint! MidPoint allows you to create not only LDAP accounts, but also the groups so it can become the ultimate tool for IT administrators or even for users with limited IT skills, really simplifying the LDAP group management. […]