MidPoint 3.6 “Comenius”

MidPoint 3.6 “Comenius” is finally released. The Comenius release is huge in all aspects. It is a feature-packed release. It has so many features that Comenius is most likely the richest release in the entire midPoint history. But the number of features is not the only thing that matters. MidPoint 3.6 brings features with a significant effect on almost any identity management and governance deployment. […]

Evolveum open source pledge

Our names are Igor Farinič and Radovan Semančík. Although you might have noticed our names you are probably not aware that we are the founders of Evolveum. Evolveum is not based on venture capital investments and therefore the control of the company is firmly in our hands. And now we would like to very clearly express our commitment to the open source approach. Evolveum was, is and always will be an open source company. […]

RBAC and ABAC

Role-Based Access Control (RBAC) has been around for decades. It is both loved and hated. Over the years many newer access control models tried to improve on RBAC. Many of these developments focus on making the model more flexible. Attribute-Based Access Control (ABAC) is perhaps the most prominent model in this category. Quite recently there Read more about RBAC and ABAC[…]

MidPoint IDM Customization and Deployment 1 training report

Last week there was a five-day MidPoint IDM Customization and Deployment 1 training in Bratislava. As always, discussing real-life challenges was inspiring for the students as well as for Evolveum and we hope it helped to transfer the knowledge in both ways – to learn midPoint, and to make it even better. Here’s a few pictures capturing Read more about MidPoint IDM Customization and Deployment 1 training report[…]

How to protect your privacy online

By 2020, more than 30.7 billion devices will be connected to the Internet. On one hand, that gives people access to information all over the world as well as an opportunity to electronize the processes and let the workflow be more efficient. On the other hand, there is a big risk of identity theft, fraud, Read more about How to protect your privacy online[…]

midPoint in 2016

Yet another year is over. 2016 was an incredibly busy year for midPoint. Lots of new midPoint deployments and projects. But most importantly the midPoint itself has significantly evolved. MidPoint is firmly based in the identity governance now. First half of 2016 produced midPoint 3.4 “Heisenberg”. Heisenberg includes a lot of new features. But one Read more about midPoint in 2016[…]

Real life story of SCIMv1 and ConnId, Part 2

When our interconnection of various services by using midPoint, SCIMv1 protocol and Connid framework was ready, we proceeded to testing. While looking around for services supporting the SCIM protocol we stumbled upon two quite popular ones. Salesforce and Slack which both support the SCIM 1.1 specification but both on their own way with a couple of Read more about Real life story of SCIMv1 and ConnId, Part 2[…]

Real life story of SCIMv1 and ConnId, Part 1

When implementing a connector for the Midpoint identity management solution, there is a potential to interconnect a broad spectrum of services. Using the System for Cross-domain Identity Management (SCIM) protocol seems as a road to take. We are also working with the connId framework. It provides a means for building identity connectors in a more Read more about Real life story of SCIMv1 and ConnId, Part 1[…]