Open Source Identity Ecosystem Idea

A significant part of open source software is developed by small independent companies. Such companies have small and highly motivated teams that are incredibly efficient. The resulting software is often much better than comparable software created by big software vendors. Especially in the Identity and Access Management (IAM) field there are open source products that Read more about Open Source Identity Ecosystem Idea[…]

Future = Open Source

North Bridge & Black Duck released the results of their 2015 Future of Open Source Survey just some days ago. Based on the information from 1300 completed responses from IT & business professionals, we can say that the community is growing pretty fast. This statement is supported by the fact that 78% of respondents said their Read more about Future = Open Source[…]

Using midPoint with CAS

Do you use CAS and need just-in-time provisioning? Use midPoint! It can be maybe simpler than you can imagine. Few days ago I got requirement if it is possible to provision identities from CAS after user logs in. For sure, you can make provisioning for each service provider using CAS by itself. But what if Read more about Using midPoint with CAS[…]

How to Get Rich by Working on Open Source Project?

There was a nice little event in Bratislava called Open Source Weekend. It was organized by Slovak Society for Open Information Technologies. It has been quite a long time since I had a public talk, therefore I’ve decided that this a good opportunity to change that. Hence I had quite an unusual presentation for this kind Read more about How to Get Rich by Working on Open Source Project?[…]

How Precise are the Analysts?

Industry analysts produce their studies and fancy charts for decades. There is no doubt that some of them are quite influential. But have you ever wondered how are the results of these studies produced? Do the results actually reflect reality? How are the positions of individual products in the charts determined? Are the methodologies based Read more about How Precise are the Analysts?[…]

Is Resource Configuration Hell? Not in MidPoint 3.1!

Resources (target or source systems) are the heart of every identity management system or provisioning tool. Of course, one might argue that users (subjects) are most important and that statement is not wrong. However, without resources, there would simply be nowhere to connect to. Certainly, this debate is not the point of this article. Its Read more about Is Resource Configuration Hell? Not in MidPoint 3.1![…]