Inalogy: Keycloak as an Access Layer Webinar Summary

From the very beginning, Inalogy has been aiming to deliver comprehensive identity and access management systems. MidPoint fits perfectly as a core IGA component, and Keycloak supports it in providing access management capabilities. In our recent “Keycloak as an Access Layer” webinar from the MidPoint Integrations: Partner Series, Ján Marcin, Inalogy’s Chief Operations Officer, explained Read more about Inalogy: Keycloak as an Access Layer Webinar Summary[…]

There is No Security without Identity Management

It isn’t. That’s how it is. Why? Take any study describing potential information security threats. What do you see among the top threats there? Take another study. What do you see there? Yes. That’s the one. It is consistently marked as one of the most serious threats in vast majority of studies published for (at least) last couple of decades. Yet it looks like nobody really knows what to do about this threat. So, who is this supervillain? He’s right under your nose. It is the insider. […]

Hacking OpenAM, Level: Nightmare

I’m dealing with the OpenAM and its predecessors for a very long time. I remember Sun Directory Server Access Management Edition (DSAME) in early 2000s. After many years and (at least) three rebrandings, the product was finally released as OpenSSO. That’s where Oracle struck and killed the product. ForgeRock picked it up. And that’s where Read more about Hacking OpenAM, Level: Nightmare[…]