All in one
Deal with identity governance, credential management or entitlement management at once. MidPoint offers you a large range of useful features which is growing constantly.
MidPoint can adapt to various needs of large range of enterprises. Small or big organizations, numerous industries.
As a second-generation IDM system, midPoint is built as an improvement of first-generation systems. It is the most comprehensive open IDM system available on the market.
Role-Based Access Control (RBAC) has been around for decades. It is both loved and hated. Over the years many newer access control models tried to improve on RBAC. Many of these developments focus on making the model more flexible. Attribute-Based Access Control (ABAC) is perhaps the most prominent model in this category. Quite recently there[…]
Last week there was a five-day MidPoint IDM Customization and Deployment 1 training in Bratislava. As always, discussing real-life challenges was inspiring for the students as well as for Evolveum and we hope it helped to transfer the knowledge in both ways – to learn midPoint, and to make it even better. Here’s a few pictures capturing[…]
By 2020, more than 30.7 billion devices will be connected to the Internet. On one hand, that gives people access to information all over the world as well as an opportunity to electronize the processes and let the workflow be more efficient. On the other hand, there is a big risk of identity theft, fraud,[…]
Yet another year is over. 2016 was an incredibly busy year for midPoint. Lots of new midPoint deployments and projects. But most importantly the midPoint itself has significantly evolved. MidPoint is firmly based in the identity governance now. First half of 2016 produced midPoint 3.4 “Heisenberg”. Heisenberg includes a lot of new features. But one[…]
When our interconnection of various services by using midPoint, SCIMv1 protocol and Connid framework was ready, we proceeded to testing. While looking around for services supporting the SCIM protocol we stumbled upon two quite popular ones. Salesforce and Slack which both support the SCIM 1.1 specification but both on their own way with a couple of[…]
When implementing a connector for the Midpoint identity management solution, there is a potential to interconnect a broad spectrum of services. Using the System for Cross-domain Identity Management (SCIM) protocol seems as a road to take. We are also working with the connId framework. It provides a means for building identity connectors in a more[…]