On the way to the practical side of the GDPR we need to recognize reasons for processing the personal data, officially known as lawful basis. It has been long time since the data processing had been uncontrolled. You have needed lawful basis since the directive had come into effect, but under the GDPR there is[…]
FOSDEM is the free and open source (FOSS) conference taking place in Brussels. We were there. Again. We talked about midPoint. Again. And it was a complete success. Even better than the last time.
Happy new year! 2018 is here. And it looks like a very exciting year for midPoint. There are new development plans for 2018 but also interesting changes in our business model. There is so much to look forward to in 2018.
MidPoint 3.7 “Darwin” was released. As the release nickname suggests Darwin is an evolutionary release. It brings few major features and changes. But more importantly it brings a large number of gradual improvements to almost every part of midPoint. The most obvious change in midPoint 3.7 is its stand-alone deployment form. Previous midPoint versions were[…]
This year (2017) was full of training courses. Literally, there was almost no month without any training. Some took place in our office in Bratislava, Slovakia, some were remote/online sessions, but most of them were onsite, which meant a lot of travelling. I travelled to Canada and United States, later also to Finland. I experienced my first transatlantic flight,[…]
Our names are Igor Farinič and Radovan Semančík. Although you might have noticed our names you are probably not aware that we are the founders of Evolveum. Evolveum is not based on venture capital investments and therefore the control of the company is firmly in our hands. And now we would like to very clearly[…]
When our interconnection of various services by using midPoint, SCIMv1 protocol and Connid framework was ready, we proceeded to testing. While looking around for services supporting the SCIM protocol we stumbled upon two quite popular ones. Salesforce and Slack which both support the SCIM 1.1 specification but both on their own way with a couple of[…]
When implementing a connector for the Midpoint identity management solution, there is a potential to interconnect a broad spectrum of services. Using the System for Cross-domain Identity Management (SCIM) protocol seems as a road to take. We are also working with the connId framework. It provides a means for building identity connectors in a more[…]
Identity management is both art and science. It may look completely deterministic. But too often there are cases that cannot be completely automated and encoded by rules. Sometimes there are cases that nobody expected. Good identity management system should be able to handle even those situations.
In its current version, midPoint can easily handle applications falling into “Internet of Things” category. In the forthcoming series of blog posts we will show how. Today let’s go through a brief introduction.