gdpr-and-identity-management-thumb

GDPR and Identity Management

General Data Protection Regulation: a lot of people are already familiar with that. Much more people will have to get familiar with it quite soon. GDPR may be seen as a trouble and there is definitely a lot of work to be done for GDPR compliance. But, honestly, such regulation was bound to happen sooner[…]

evolveum-comenius-smaller

MidPoint 3.6 “Comenius”

MidPoint 3.6 “Comenius” is finally released. The Comenius release is huge in all aspects. It is a feature-packed release. It has so many features that Comenius is most likely the richest release in the entire midPoint history. But the number of features is not the only thing that matters. MidPoint 3.6 brings features with a[…]

services-and-things

Services and Things

Evolveum midPoint is a very comprehensive system. It can manage identities, roles and organizational structures. Simply speaking it can manage anything that is at least marginally related to the concept of identity. Yet until quite recently support for one broad area was missing and it was added in midPoint 3.4. Now midPoint can also manage[…]

midPoint and Openstack

Once upon a time

Once upon a time there was an idea to manage more than the users and their accounts using midPoint. We moved beyond the boundaries of traditional old-fashioned identity managers introducing generic synchronization which allows to synchronize and manage organizations, organizational units, groups, group membership and everything related to identities. The constraints in relation to identities[…]

There is No Security without Identity Management

There is No Security without Identity Management

It isn’t. That’s how it is. Why? Take any study describing potential information security threats. What do you see among the top threats there? Take another study. What do you see there? Yes. That’s the one. It is consistently marked as one of the most serious threats in vast majority of studies published for (at[…]

Using-midPoint-with-CAS

Using midPoint with CAS

Do you use CAS and need just-in-time provisioning? Use midPoint! It can be maybe simpler than you can imagine. Few days ago I got requirement if it is possible to provision identities from CAS after user logs in. For sure, you can make provisioning for each service provider using CAS by itself. But what if[…]

Is Resource Configuration Hell? Not in MidPoint 3.1!

Resources (target or source systems) are the heart of every identity management system or provisioning tool. Of course, one might argue that users (subjects) are most important and that statement is not wrong. However, without resources, there would simply be nowhere to connect to. Certainly, this debate is not the point of this article. Its[…]

FOSDEM 2015: Attending and observing

This year we finally visited famous FOSDEM, that was our destination This year we finally visited famous free conference for software developers to meet, share, collaborate and grow their communities. Just like every year, the event was organized in Brussels and was hosted by the Université Libre. The main motivation was to explore the conference[…]