ISO 27001 Webinar Summary

ISO 27001 is an international standard for information security. It is guidelines for cybersecurity best practices used all over the world. Identity governance and administration (IGA) plays a major part. It is quite natural that midPoint, being a leading open source IGA platform, can be an essential tool for ISO 27001 compliance. […]

Flexible Authentication Webinar Summary

Authentication methods are constantly evolving. Today, traditional authentication with a username and password is not enough. There are different authentication methods that can be employed. That’s why we introduced the new concept of flexible authentication in midPoint 4.1. Authentication methods in midPoint can now be configured in many different ways using various combinations of authentication Read more about Flexible Authentication Webinar Summary[…]

Smart Correlation Webinar Summary

MidPoint 4.6 brought about a new feature called “Smart Correlation” that allowed us to correlate accounts flexibly and powerfully. In the webinar that took place on March 21, 2024, we described the basics of correlation in general and the Smart Correlation midPoint feature in particular. Composable correlation rules with set confidence levels, approximate matching, human Read more about Smart Correlation Webinar Summary[…]

Introducing MidPoint Query Language: Simplifying Queries in MidPoint

Since version 4.8 midPoint fully supports new language for querying of objects – the MidPoint Query Language. The MidPoint Query Language marks a significant upgrade from the previous XML query language, offering a more intuitive way to query objects. It serves as the primary query language throughout midPoint, seamlessly replacing XML queries in both configuration Read more about Introducing MidPoint Query Language: Simplifying Queries in MidPoint[…]

Request Access Workshop Summary

Requesting new access by users or their managers is a common use case in many organizations. While this feature was available even in older versions of midPoint, it was simple and not very user-friendly. Listening to our customers and redesigning the whole feature and user interface brought us a much better user experience and configuration Read more about Request Access Workshop Summary[…]

Unlocking Accessibility in MidPoint Webinar Summary

Accessibility is gaining increased attention worldwide, and we appreciate the growing awareness. We’re determined not to lag behind, aiming to propel midPoint to new heights. The beauty lies in our differences, underscoring the paramount importance of inclusivity in environmental development. Starting from version 4.8, our focus has intensified on dismantling barriers within midPoint, making it Read more about Unlocking Accessibility in MidPoint Webinar Summary[…]

MidPoint with Ninja Webinar Summary

Upgrading midPoint deployment is quite complex and tedious task that requires a lot of preparation, planning and manual work. Even before the upgrade itself started. Analysis of existing configuration, data and customizations is necessary to understand the impact of the upgrade. With midPoint 4.8 we have introduced a new set of features to our tool Read more about MidPoint with Ninja Webinar Summary[…]

Simulations Webinar Summary

Traditionally, the midPoint deployment process was quite an adventurous endeavor. Many of us remember those moments of excitement waiting for a task to finish, just to see all the damage it caused. Fortunately, in April 2023, midPoint 4.7 “Johnson” brought about the Simulations feature that relieved us from those dreadful experiences. Instead, it allows us Read more about Simulations Webinar Summary[…]

MidPoint 4.6 Webinar Summary

MidPoint 4.6 Webinar Summary

Last Thursday we organized a webinar dedicated to what’s new in midPoint 4.6. After the marathon of webinars related to the LTS version 4.4 we took a break after 4.5, but now we’re back with our tradition of What’s New webinars. Version 4.6, code-named “Baumgarten”, brings a lot of improvements – and not only under Read more about MidPoint 4.6 Webinar Summary[…]