Access Certification in midPoint

Identity Management (IDM) systems usually provide quite a broad mix of features. But there is one thing that no other system can do: management of access rights. No other system comes even close, even if they often pretend to do so. Access rights, privileges, role assignments, authorities, authorizations … whatever these things are called they need to be managed. They need to be assigned to the right people in the right systems at the right time. And that is no easy task. […]

You know what time it is? It’s ‘Get Lincoln’ time!

You know what time it is? It’s Get Lincoln time!

Just few months passed since our last release called Tycho and yet we would like to introduce you to midPoint’s new face: Lincoln. Inspired by a man who supported internal improvements of society and orderly progress, midPoint 3.3 follows his steps with many subtle improvements to both user interface and internal midPoint logic, which takes the usability to another level. […]

Open Source Identity Ecosystem Idea

A significant part of open source software is developed by small independent companies. Such companies have small and highly motivated teams that are incredibly efficient. The resulting software is often much better than comparable software created by big software vendors. Especially in the Identity and Access Management (IAM) field there are open source products that Read more about Open Source Identity Ecosystem Idea[…]

Future = Open Source

North Bridge & Black Duck released the results of their 2015 Future of Open Source Survey just some days ago. Based on the information from 1300 completed responses from IT & business professionals, we can say that the community is growing pretty fast. This statement is supported by the fact that 78% of respondents said their Read more about Future = Open Source[…]

Using midPoint with CAS

Do you use CAS and need just-in-time provisioning? Use midPoint! It can be maybe simpler than you can imagine. Few days ago I got requirement if it is possible to provision identities from CAS after user logs in. For sure, you can make provisioning for each service provider using CAS by itself. But what if Read more about Using midPoint with CAS[…]