Securing Access: The Power of Access Certification in IGA Webinar Summary

Maintaining up-to-date user access rights is a paramount security challenge. Changes in the organizational structure, the transfer of users to other departments, changes in security policies, and other transformational processes within a company require the reassessment of the existing access rights. A regular review of user access is a key element of an effective access Read more about Securing Access: The Power of Access Certification in IGA Webinar Summary[…]

Access Certification in midPoint

Identity Management (IDM) systems usually provide quite a broad mix of features. But there is one thing that no other system can do: management of access rights. No other system comes even close, even if they often pretend to do so. Access rights, privileges, role assignments, authorities, authorizations … whatever these things are called they need to be managed. They need to be assigned to the right people in the right systems at the right time. And that is no easy task. […]