Future = Open Source

North Bridge & Black Duck released the results of their 2015 Future of Open Source Survey just some days ago. Based on the information from 1300 completed responses from IT & business professionals, we can say that the community is growing pretty fast. This statement is supported by the fact that 78% of respondents said their Read more about Future = Open Source[…]

Using midPoint with CAS

Do you use CAS and need just-in-time provisioning? Use midPoint! It can be maybe simpler than you can imagine. Few days ago I got requirement if it is possible to provision identities from CAS after user logs in. For sure, you can make provisioning for each service provider using CAS by itself. But what if Read more about Using midPoint with CAS[…]

How to Get Rich by Working on Open Source Project?

There was a nice little event in Bratislava called Open Source Weekend. It was organized by Slovak Society for Open Information Technologies. It has been quite a long time since I had a public talk, therefore I’ve decided that this a good opportunity to change that. Hence I had quite an unusual presentation for this kind Read more about How to Get Rich by Working on Open Source Project?[…]

How Precise are the Analysts?

Industry analysts produce their studies and fancy charts for decades. There is no doubt that some of them are quite influential. But have you ever wondered how are the results of these studies produced? Do the results actually reflect reality? How are the positions of individual products in the charts determined? Are the methodologies based Read more about How Precise are the Analysts?[…]

Is Resource Configuration Hell? Not in MidPoint 3.1!

Resources (target or source systems) are the heart of every identity management system or provisioning tool. Of course, one might argue that users (subjects) are most important and that statement is not wrong. However, without resources, there would simply be nowhere to connect to. Certainly, this debate is not the point of this article. Its Read more about Is Resource Configuration Hell? Not in MidPoint 3.1![…]

Hacking OpenAM, Level: Nightmare

I’m dealing with the OpenAM and its predecessors for a very long time. I remember Sun Directory Server Access Management Edition (DSAME) in early 2000s. After many years and (at least) three rebrandings, the product was finally released as OpenSSO. That’s where Oracle struck and killed the product. ForgeRock picked it up. And that’s where Read more about Hacking OpenAM, Level: Nightmare[…]