DAASI International: MidPoint and SCIM Webinar Summary

DAASI International: MidPoint and SCIM Webinar Summary

DAASI International specializes in identity and access management systems while using open source solutions. As strong advocates for open standards, they prioritize standard-based approaches in their projects to integrate systems effectively. The modern and widely adopted SCIM (System for Cross-domain Identity Management) standard is particularly beneficial for cloud system integration. To facilitate the integration of Read more about DAASI International: MidPoint and SCIM Webinar Summary[…]

Securing Access: The Power of Access Certification in IGA Webinar Summary

Maintaining up-to-date user access rights is a paramount security challenge. Changes in the organizational structure, the transfer of users to other departments, changes in security policies, and other transformational processes within a company require the reassessment of the existing access rights. A regular review of user access is a key element of an effective access Read more about Securing Access: The Power of Access Certification in IGA Webinar Summary[…]

Inalogy: Keycloak as an Access Layer Webinar Summary

From the very beginning, Inalogy has been aiming to deliver comprehensive identity and access management systems. MidPoint fits perfectly as a core IGA component, and Keycloak supports it in providing access management capabilities. In our recent “Keycloak as an Access Layer” webinar from the MidPoint Integrations: Partner Series, Ján Marcin, Inalogy’s Chief Operations Officer, explained Read more about Inalogy: Keycloak as an Access Layer Webinar Summary[…]

Group Management with MidPoint Webinar Summary

The identity governance and administration world is not just about identities and their accounts. It is also about their access rights, e.g., group membership. But how can midPoint adopt the existing access rights, present them as roles, and start managing them? What if midPoint is not allowed to manage some groups at a given time Read more about Group Management with MidPoint Webinar Summary[…]

Role Mining in MidPoint Webinar Summary

On September 26, 2024, we held a webinar focused on the role mining feature in midPoint that is designed to help organizations optimize access control by revealing hidden business information. This webinar explored role mining as a solution to common challenges, such as over-permissioning, the lack of insight into access rights, and role explosion that Read more about Role Mining in MidPoint Webinar Summary[…]

Happy Halloween From Evolveum

Identity management and identity governance might feel straightforward – until things go terribly wrong. This Halloween, we’re sharing five bone-chilling tales that IT teams everywhere can relate to. From ghosts in the system to a zombie outbreak of lingering access permissions, these stories reveal just how quickly things can spiral when situations take a dark Read more about Happy Halloween From Evolveum[…]

Atricore: Enhancing Security through MidPoint and SIEM Integration Webinar Summary

We organized another webinar from the MidPoint Integrations: Partner Series, featuring our partner Atricore and Wazuh! Atricore’s CTO Sebastián Gonzalez Oyuela, their CEO Gianluca Brigandi, and Wazuh’s IT Security Engineer Gerardo David Caceres Fleitas explored how integrating midPoint with the OSS SIEM Wazuh enhances security, streamlines IGA, and ensures regulatory compliance. The presentation included a Read more about Atricore: Enhancing Security through MidPoint and SIEM Integration Webinar Summary[…]

AMI Praha: SAP SuccessFactors HR Webinar Summary

We organized a webinar within our MidPoint Integrations: Partner Series iniciative, led by AMI Praha‘s Chief Solution Architect, Martin Lízner, where you could explore Fortuna Entertainment Group’s shift from an on-premise HR system to an SAP SuccessFactors cloud solution thanks to midPoint. Martin explained how AMI Praha integrated this new HR system into their existing Read more about AMI Praha: SAP SuccessFactors HR Webinar Summary[…]

MidPoint Intermediate Training Teaser Webinar Summary

MidPoint is a comprehensive, feature-rich identity management and governance platform. Since the beginning, the major task of midPoint customization has been configuring midPoint behavior. This includes the preparation of schema handling, mapping, object templates, and more. If you follow our First Steps Methodology, you can manage the configuration entirely in the GUI, but there are Read more about MidPoint Intermediate Training Teaser Webinar Summary[…]

NIS2 Directive and Identity Governance

The NIS2 Directive of the European Union aims to increase level of cybersecurity in crucial sectors of industry and government. The directive introduces cybersecurity requirements that are expected to be applied consistently across the EU. The directive touches on many areas of cybersecurity, including identity governance and administration. Directive (EU) 2022/2555 of the European Parliament Read more about NIS2 Directive and Identity Governance[…]