Practical organization structure in Active Directory

When we are deploying Identity Management (IDM) solution in organization, we are facing a number of questions. One of them is how to map organization structure scheme (first picture below) to target system so we can facilitate and clarify the work of administrators to manage access and privileges tied to organization structure (OS). Let me Read more about Practical organization structure in Active Directory[…]

FOSDEM 2016 and my first talk?

On Monday, I travelled back home from FOSDEM Conference which I was attending for the second time. Last year I was only an attendee enjoying the atmosphere made by all these open-source positive people, but this year I decided to move further and try to apply for a talk. When I was sending a proposal Read more about FOSDEM 2016 and my first talk?[…]

Infrastructure Provisioning in context of organization

At present, companies go for moving their infrastructure to the clouds, which became synonyms for cost efficiency. Instead of using public cloud, why not to create your own exactly according to your needs? OpenStack is one of the options there for you. By deploying identity management system (midpoint) in different companies I learnt people have different Read more about Infrastructure Provisioning in context of organization[…]

MidPoint Deployment Workshop Challenge

During the last weeks of 2015, the Evolveum team was partially “distributed” around the Europe. There were multiple conferences and similar public events and also two midPoint workshops led by me, in Switzerland and Germany. I used to lead a lot of trainings and workshops in Evolveum and also before, but the workshops are usually more challenging, especially when they are organized for the partners, not the end customers. The partners usually already have experience with different products and try to match the features during the courses. Their expectations are both specific to a project and also abstract – conceptual. MidPoint deployment workshop can be very effective way how to boost your midPoint knowledge in a couple of days.

[…]

You know what time it is? It’s ‘Get Lincoln’ time!

You know what time it is? It’s Get Lincoln time!

Just few months passed since our last release called Tycho and yet we would like to introduce you to midPoint’s new face: Lincoln. Inspired by a man who supported internal improvements of society and orderly progress, midPoint 3.3 follows his steps with many subtle improvements to both user interface and internal midPoint logic, which takes the usability to another level. […]

LDAPcon 2015 Is Over

The LDAP conference was held in Edinburgh this year. And it was fascinating.

It was my first time that I have visited Scotland. Despite the infamous weather conditions it was a very pleasant experience. Edinburgh is a really impressive city. And Scotland has much to offer in a form of food and drinks that pretty much compensate the weather.

It was also my first time at LDAPcon. And now I pity that I’ve missed the previous conferences. I have decided that I will not repeat that mistake ever again. The conference size is just right: enough people to make it interesting and not too many to make it a crowded place. There were LDAP hardcore topics, engineering topics, standards talks and even an excursion to digital humanities and a violin performance. Overall it was a very interesting mix.
[…]

Different Naming Conventions For Different User Types

The user naming attribute “name” is a string attribute and can be defined manually. MidPoint will ensure that the value of this attribute is unique. Although for small setups there is no problem with entering this attribute value manually, it can be usually defined by an expression based on various UserType object properties (attributes). In Read more about Different Naming Conventions For Different User Types[…]

Open Source Identity Ecosystem Idea

A significant part of open source software is developed by small independent companies. Such companies have small and highly motivated teams that are incredibly efficient. The resulting software is often much better than comparable software created by big software vendors. Especially in the Identity and Access Management (IAM) field there are open source products that Read more about Open Source Identity Ecosystem Idea[…]