Regulatory Compliance with MidPoint

Regulatory compliance is becoming a hot topic. Several countries are improving their cybersecurity legislation, led by the European Union. There are many legislative acts, standards, and recommendations that have to be considered. It is almost impossible to comply with all the relevant regulations without the appropriate automation. […]

MidPoint as Part of the Complex IT Landscape

Digital transformation and evolution introduced new processes to businesses, and even the existing processes have become more complex and interconnected throughout companies’ infrastructures. In a regulatory controlled environment, there are additional information security requirements together with legal and compliance policies resulting in even more complex processes and workflows. One of the most important factors for Read more about MidPoint as Part of the Complex IT Landscape[…]

HR contract

How to notify future account expiration

In my previous posts, I wrote how you can fix temporary mistakes in HR data. If you have up to date data in HR, you are a happy Identity Engineer and your customer is a happy midPoint user. Midpoint automatically creates the user from HR data, send new user’s credentials over email or SMS. Set Read more about How to notify future account expiration[…]

Identity Governance - midPoint Experience

Identity Governance – MidPoint Experience (Part II)

In the previous part, I outlined governance features that organizations may use if they wish to fully enjoy the advantage of having Identity Management solution. Today, I will show some examples of how Identity Governance features are handled in midPoint. I will start with simple workflow, that can be for instance enforced on user-role assignment Read more about Identity Governance – MidPoint Experience (Part II)[…]

Identity Governance - midPoint Experience

Identity Governance – MidPoint Experience (Part I)

I’ve been part of midPoint community for about five years now. During that time, I’ve made several deployments of midPoint Identity Management in both medium and large organizations. I’m proud that all of these projects came to be successful for us (as the Evolveum partner) and the customer as well. Big thanks for this goes Read more about Identity Governance – MidPoint Experience (Part I)[…]

Evolveum: midPoint release 3.8 called Watt

MidPoint 3.8 “Watt”

MidPoint 3.8 “Watt” was released. Release nickname once again suggests the main focus of the release: performance and scalability. Significant part of development effort of midPoint 3.8 was aimed at scaling. MidPoint is now able to support deployments that go well over millions of identities. While earlier midPoint versions were also able to reach this Read more about MidPoint 3.8 “Watt”[…]

midPoint book: chapter 5

MidPoint Book: Chapter 5

More than a year ago we have published the first version of a book about midPoint. It was our Christmas present to midPoint community. Although the book is not finished yet, we have decided to publish it anyway. The book follows the same evolutionary approach as midPoint development does. It is improving its incremental steps. And now it is time for the next step. Therefore we have published new version of the book with a brand new chapter. […]

Evolveum: IT security threats in 2018

IT security threats in 2018: are you ready for them?

2017 was a really great year. For hackers. Many of us heard about WannaCry and NotPetya that took down over 300,000 computers across the world, including the UK’s National Health Service or government agencies in Ukraine. CCleaner, a utility program millions of Windows users rely on to clear potentially unwanted files off their PCs, got hit by a malware. The installer was patched to remove the malware, but only after over 700,000 machines were already infected. […]