Identity Governance - midPoint Experience

Identity Governance – MidPoint Experience (Part II)

In the previous part, I outlined governance features that organizations may use if they wish to fully enjoy the advantage of having Identity Management solution. Today, I will show some examples of how Identity Governance features are handled in midPoint. I will start with simple workflow, that can be for instance enforced on user-role assignment Read more about Identity Governance – MidPoint Experience (Part II)[…]

Identity Governance - midPoint Experience

Identity Governance – MidPoint Experience (Part I)

I’ve been part of midPoint community for about five years now. During that time, I’ve made several deployments of midPoint Identity Management in both medium and large organizations. I’m proud that all of these projects came to be successful for us (as the Evolveum partner) and the customer as well. Big thanks for this goes Read more about Identity Governance – MidPoint Experience (Part I)[…]

Evolveum: midPoint release 3.8 called Watt

MidPoint 3.8 “Watt”

MidPoint 3.8 “Watt” was released. Release nickname once again suggests the main focus of the release: performance and scalability. Significant part of development effort of midPoint 3.8 was aimed at scaling. MidPoint is now able to support deployments that go well over millions of identities. While earlier midPoint versions were also able to reach this Read more about MidPoint 3.8 “Watt”[…]

midPoint book: chapter 5

MidPoint Book: Chapter 5

More than a year ago we have published the first version of a book about midPoint. It was our Christmas present to midPoint community. Although the book is not finished yet, we have decided to publish it anyway. The book follows the same evolutionary approach as midPoint development does. It is improving its incremental steps. And now it is time for the next step. Therefore we have published new version of the book with a brand new chapter. […]

Evolveum: IT security threats in 2018

IT security threats in 2018: are you ready for them?

2017 was a really great year. For hackers. Many of us heard about WannaCry and NotPetya that took down over 300,000 computers across the world, including the UK’s National Health Service or government agencies in Ukraine. CCleaner, a utility program millions of Windows users rely on to clear potentially unwanted files off their PCs, got hit by a malware. The installer was patched to remove the malware, but only after over 700,000 machines were already infected. […]

midPoint release named after Charles Robert Darwin

MidPoint 3.7 “Darwin”

MidPoint 3.7 “Darwin” was released. As the release nickname suggests Darwin is an evolutionary release. It brings few major features and changes. But more importantly it brings a large number of gradual improvements to almost every part of midPoint.

The most obvious change in midPoint 3.7 is its stand-alone deployment form. Previous midPoint versions were designed as traditional Java web applications, distributed in a WAR file that had to be deployed in a web container. This approach was a common routine years ago when midPoint project started. But the world moved on and midPoint had to adapt. Therefore, midPoint 3.7 moved to a stand-alone deployment. All that is needed is to download midPoint and start it up. No need to deploy it to a web container. The traditional WAR file is still provided as an deployment option and it is still supported. But the stand-alone form factor is now the recommended way to run midPoint. […]

MidPoint 3.6 “Comenius”

MidPoint 3.6 “Comenius” is finally released. The Comenius release is huge in all aspects. It is a feature-packed release. It has so many features that Comenius is most likely the richest release in the entire midPoint history. But the number of features is not the only thing that matters. MidPoint 3.6 brings features with a significant effect on almost any identity management and governance deployment. […]