Smart Match

In identity management there is a class of petty issues that appear and re-appear all the time. Even though these issues are easy to understand, they are tricky to completely eliminate and they often have very nasty consequences. These seemingly unimportant issues frequently result in nights spent resolving a total breakdown of IDM system. What is this devil that kills sleep and keeps engineers away from the families? It is the daemon of case insensitivity and his friends. […]

Problem Analysis with Evolveum Log Viewer

Life of a midPoint developer is a colorful one. There are enjoyable periods of building things when you have a luxury of undisturbed raising smaller or larger pieces of code. But sometimes there comes an interrupt: you break something in such a way that you are not able to find what is wrong – for hours or even for days, occasionally. Also regularly, after “feature freeze” points, there arrive periods of intensive and merciless hunting of remaining bugs. Besides this, often a colleague, customer, partner or a friend on the mailing list comes with a problem he or she urgently needs to help with.

The core of midPoint – IdM Model Subsystem – is an extremely powerful and flexible computation engine. It can be configured to implement almost all policies one could imagine. But with such flexibility comes potential (and sometimes very real) complexity: for more advanced configurations it is very easy to make a mistake that, with a bit of bad luck, manifests itself in a quite unexpected way.

[…]

Access Certification in midPoint

Identity Management (IDM) systems usually provide quite a broad mix of features. But there is one thing that no other system can do: management of access rights. No other system comes even close, even if they often pretend to do so. Access rights, privileges, role assignments, authorities, authorizations … whatever these things are called they need to be managed. They need to be assigned to the right people in the right systems at the right time. And that is no easy task. […]

Practical organization structure in Active Directory

When we are deploying Identity Management (IDM) solution in organization, we are facing a number of questions. One of them is how to map organization structure scheme (first picture below) to target system so we can facilitate and clarify the work of administrators to manage access and privileges tied to organization structure (OS). Let me Read more about Practical organization structure in Active Directory[…]

FOSDEM 2016 and my first talk?

On Monday, I travelled back home from FOSDEM Conference which I was attending for the second time. Last year I was only an attendee enjoying the atmosphere made by all these open-source positive people, but this year I decided to move further and try to apply for a talk. When I was sending a proposal Read more about FOSDEM 2016 and my first talk?[…]

Infrastructure Provisioning in context of organization

At present, companies go for moving their infrastructure to the clouds, which became synonyms for cost efficiency. Instead of using public cloud, why not to create your own exactly according to your needs? OpenStack is one of the options there for you. By deploying identity management system (midpoint) in different companies I learnt people have different Read more about Infrastructure Provisioning in context of organization[…]

MidPoint Deployment Workshop Challenge

During the last weeks of 2015, the Evolveum team was partially “distributed” around the Europe. There were multiple conferences and similar public events and also two midPoint workshops led by me, in Switzerland and Germany. I used to lead a lot of trainings and workshops in Evolveum and also before, but the workshops are usually more challenging, especially when they are organized for the partners, not the end customers. The partners usually already have experience with different products and try to match the features during the courses. Their expectations are both specific to a project and also abstract – conceptual. MidPoint deployment workshop can be very effective way how to boost your midPoint knowledge in a couple of days.

[…]

You know what time it is? It’s ‘Get Lincoln’ time!

You know what time it is? It’s Get Lincoln time!

Just few months passed since our last release called Tycho and yet we would like to introduce you to midPoint’s new face: Lincoln. Inspired by a man who supported internal improvements of society and orderly progress, midPoint 3.3 follows his steps with many subtle improvements to both user interface and internal midPoint logic, which takes the usability to another level. […]

LDAPcon 2015 Is Over

The LDAP conference was held in Edinburgh this year. And it was fascinating.

It was my first time that I have visited Scotland. Despite the infamous weather conditions it was a very pleasant experience. Edinburgh is a really impressive city. And Scotland has much to offer in a form of food and drinks that pretty much compensate the weather.

It was also my first time at LDAPcon. And now I pity that I’ve missed the previous conferences. I have decided that I will not repeat that mistake ever again. The conference size is just right: enough people to make it interesting and not too many to make it a crowded place. There were LDAP hardcore topics, engineering topics, standards talks and even an excursion to digital humanities and a violin performance. Overall it was a very interesting mix.
[…]