evolveum-noris-training-courses

2017 – The Year of midPoint Training Courses

This year (2017) was full of training courses. Literally, there was almost no month without any training. Some took place in our office in Bratislava, Slovakia, some were remote/online sessions, but most of them were onsite, which meant a lot of travelling. I travelled to Canada and United States, later also to Finland. I experienced my first transatlantic flight,[…]

lawful-basis

GDPR Lawful Basis Management

The first thing that most likely comes to the mind when people hear about GDPR is “consent”. That is understandable, as better part of the buzz around GDPR is about customer identities and digital marketing. But this emphasis on consumer identities is casting shadow on other aspects of GDPR that are at least as much[…]

new-connectors-thumb

New LDAP and CSV identity connectors

Identity connectors are important part of any identity management (IDM) project. For an IDM solution the connector provide interface to the outer world. And there are few connectors that almost any IDM solution needs: LDAP, Active Directory and CSV. New versions of those connectors were released recently. And there is an interesting story behind those[…]

GDPR rights and principles II

GDPR – Rights and principles II.

Last article was devoted to the principles concerning controller’s duties. On contrary, today’s principles will express what data subjects may call for. Accuracy Personal data must be accurate and kept up to date, in other way it should be deleted or amended. So far nothing new in comparison with the Directive. The controllers must make[…]

GDPR - Rights and principles I.

GDPR – Rights and principles I.

Today we will continue discovering GDPR principles by giving attention to two new principles introduced by GDPR. Both of them seem to be burdensome and restrictive for controllers, presenting their new duties and restraints. The purpose limitation principle The purpose limitation principle says the personal data collected for one purpose should not be used for[…]

midPoint-and-GDPR-thumb

midPoint and GDPR

General data protection regulation (GDPR) is all about good management of identity data. And that is exactly what identity management (IDM) technologies do. Also, it is unlikely that GDPR compliance can be effectively implemented without any support from the technology. And that’s where IDM systems come in again. Overall, IDM technologies are almost perfect fit[…]

evolveum-comenius-smaller

MidPoint 3.6 “Comenius”

MidPoint 3.6 “Comenius” is finally released. The Comenius release is huge in all aspects. It is a feature-packed release. It has so many features that Comenius is most likely the richest release in the entire midPoint history. But the number of features is not the only thing that matters. MidPoint 3.6 brings features with a[…]

evolveum-open-source-pledge

Evolveum open source pledge

Our names are Igor Farinič and Radovan Semančík. Although you might have noticed our names you are probably not aware that we are the founders of Evolveum. Evolveum is not based on venture capital investments and therefore the control of the company is firmly in our hands. And now we would like to very clearly[…]

From Waveset to Midpoint, part 1

From Waveset to midPoint, Part 1

Back in 2000s the Sun Identity Manager was the king. It was the best IDM product pursuant to Gartner. It had a good market share. And according to my experience it was actually the only practical IDM system on the market. Sun Identity Manager is now dead. It died in 2010 when Sun Microsystems was acquired[…]

A way to fight your fears or Self Service implementation

A way to fight your fears or Self Service implementation

This is my story. Let me share it with you. When I heard abbreviation IDM at the first time, I understood nothing (IDM administrators, please, don’t laugh very loudly at this moment  And by the way, don’t read this post at all). Even when I heard the full definition of Identity Management I got the same[…]