midpoint Overview Radovan Semančík December 2015
|
|
- Veronica Blair
- 8 years ago
- Views:
Transcription
1 midpoint Overview Radovan Semančík December 2015
2 Agenda Identity Management Introduction midpoint Introduction midpoint Architecture Conclusion
3 Identity Management Introduction
4 Identity Management System Admin Requester Approver Users Application Application Provisioning System Identity Repository Application HR Application CRM Application A M
5 Identity Management: Provisioning Making sure that users have the correct access rights Automating the processes of access right management Hiring new employee: creating accounts Reorg: modifications of access privileges Layoffs: deleting/disabling accounts Visibility and security Audits, attestations, reporting
6 User Provisioning System HR Workflow Engine LDAP Domain SOAP Agent SQL ERP Legacy System Database Applications
7 About Evolveum
8 Evolveum Team History since approx various LDAP and IDM projects, various companies since 2004: nlight IDM Professional Services Sun Microsystems, Novell : Cooperation with ForgeRock Contributing to OpenIDM v1 2011: Evolveum Independent development of midpoint Cooperative business model
9 Evolveum Focused open source development company Almost all employees are engineers Development and research Minimalistic sales and marketing All team members have academic degree (including 2 PhDs) Indirect partner-based business Customer Partner Evolveum Cooperation is the key
10 Ecosystem Pure open source model No open-core or dual licencing Contributions are welcome Distributed development Code created by several development teams Coordinated and integrated by Evolveum Evolveum is a maintainer, not owner of the code Cooperation instead of domination Evolveum partners add value Cloud, integrated solutions, managed services, extensions, plugins, connectors,... Trade influence for control to get mutual benefits
11 Open Source Identity Ecosystem OSIAM (Access Management) Shibboleth (Federation) (GRC) Syncope (Identity Provisioning) (Access Management) midpoint (Identity Provisioning) ConnId (Identity Connectors) (Identity Repository) 389 Directory Server (Identity Repository) CAS (Single Sign-On) Fortress (IAM SDK) OpenLDAP (Directory Server)
12 midpoint Introduction
13 MidPoint at a Glance Open-source User Provisioning system 100% open-source, no licence cost, no usage restrictions Next-generation system Open architecture, extensible, standard-based, Java/XML/REST Deployment and maintenance efficiency 20% of effort to get 80% of result Based on a decade of IDM experience
14 MidPoint Big Picture Target Systems midpoint Source Systems Identity Connectors
15 midpoint Features Overview Identity Lifecycle Management Hiring people, firing people, changing assignments RBAC, workflows, processes, rules, policies Identity Integration Connectors for source and target systems ( resources ) Customizable and Extensible Extensible using expressions and plug-ins (open-closed principle) High-level standard languages (Groovy, JavaScript, XPath2, BPMN) 100% open source, maven, git
16 Inside midpoint Modern lightweight Java architecture Spring, Spring Security, Prism Objects, Wicket Extensible by scripting expressions Groovy, Python, JavaScript, XPath v2,... Connectors Polygon, ConnId, OpenICF External services REST, SOAP/WSDL Workflow Activiti BPM engine integration
17 Unique Features Completely open Open source, open development process, customize anything Works out-of-the-box Many IDM configurations already pre-implemented Advanced RBAC/ABAC Conditional roles, parametric roles, Relative Changes, Synchronization and Consistency Easy to maintain consistency, lock-free, self-healing system PrismObjects Dynamic schemas, customization, unifying XML and JSON
18 MidPoint in numbers At least 13 years of IDM experience At least 11 years of research (12 publications) More than 5 years of active development (13 releases) More than lines of code Estimated project cost: $ (COCOMO, openhub.net) Average 100 commits per month (total 9007 commits) More than 3300 automated tests More than 500 wiki pages containing documentation
19 The past, the present and the future
20 midpoint History 2004: nlight IDM specialist company Mostly Sun IDM (but also other technologies) 2009: Sun acquired by Oracle Death of Sun IDM.. end of business? Spring 2010: OpenIDMv1 nlight cooperating with ForgeRock on OpenIDM development Spring 2011: ForgeRock is changing course OpenIDMv2 plan: drop everything, reinvent everything May 2011: midpoint project start Evolveum established by nlight and others 2012 and on: independent development Technolgical leadership Cooperation with other open source companies: Identity Ecosystem
21 Current State (version 3.2) Rich provisioning functionality (mappings, scripting,...) Live synchronization, reconciliation, import Advanced RBAC, organizational structure Administration GUI Generic synchronization, entitlements Fine-grained authorizations, delegated administration Advanced features Time constraints, higher-order dependencies, consistency, Governance (technology preview)
22 Where is midpoint used
23 Roadmap MidPoint 3.0 (Newton) RELEASED New look and feel, usability improvements MidPoint 3.4 RELEASED Access certification (preview), MidPoint 3.3 (Lincoln) RELEASED Improved GUI, wizards, MidPoint 3.2 (Tycho) Delegated administration, generic sync, REST, MidPoint 3.1, (Sinan) RELEASED Access certification, synchronization GUI, Spring 2015
24 MidPoint 3.x Is Revolutionary It goes beyond Identity Management Generic Synchronization Synchronize everything with everything Entitlements Support for groups and privileges (PIM) REST (and JSON and YAML later) Delegated Administration Fine-grained authorizations + organizational structure New GUI Look and Feel - Customizable
25 Open and Dynamic Development Completely open development Public distributed source code management (git, planned soon) Public task tracking (Jira) Public communication and documentation (mailing lists, wiki) Public planning (roadmap, Jira) User (customer) participation (Paying) customers influence roadmap and take precedence MidPoint users can influence the development plan Contributions
26 midpoint Architecture
27 MidPoint Big Picture Target Systems midpoint Source Systems Identity Connectors
28 Internal Architecture midpoint Administrators Users User Interface User Interface Business Logic Resources IDM Model Provisioning Repository
29 Internal Architecture Custom User Interface Administrators Users Admin User Interface Business Logic (workflow) Processing the policies IDM Model RBAC, mappings, conditions,... Relational Database Provisioning Repository ConnId Identity Connector Framework Resources
30 Internal Architecture Administrators Users User Interface User Interface Customized Fixed ( off the shelf ) Business Logic IDM Model Resources Provisioning Repository
31 Internal Architecture User Interface Part Extensible User Interface Deployer/Customer may provide his own code, Administrators extend the interfaces, even replace some Users Business Logic components Customized Fixed ( off the shelf ) IDM Model Configurable Part Provisioning Deployer/Customer should only configure the components here. The structure and code Repository should not be changed. Resources
32 Technologies Platform: Lightweight Java Java, Spring, Spring Security, Backlog (SLF4J) Data Model: Prism Objects (generated from XML Schemas) Web GUI (AJAX): Wicket Business logic and customization Groovy, JavaScript or XPath v2 for mappings and expressions Activiti BPM Workflow Interfaces: Java API, SOAP and REST Java APIs most efficient (parts of midpoint are embeddable) Web services (SOAP/WSDL, full schema support) REST interface
33 Identity Connectors Common Identity Connector Framework Sun Identity Connector Framework ConnId Compatible connectors AD, DB Table, DB2, MySQL, Oracle, RACF, Solaris, SPML, VMS, FlatFile, XML, Solaris, SAP,... LDAP: OpenLDAP, 389ds, OpenDJ, edirectory, Active Directory CSV file, Office365, SAS, GitLab, Lotus, LifeRay
34 Concrete Architecture - Web Container (Application Server) J2EE Web Container midpoint GUI Web Service Provisioning Model Repository RDB
35 Architecture Documentation UML Model (astah*)
36 midpoint Deployment Example
37 Example midpoint Deployment Architecture Microsoft Applications Administrator AD Connector (remote) midpoint User Self-Service (Web GUI) Identity Management Policies (rules, processes) Web GUI Scheduled Exports ADSI Active Directory CSV File SQL IDM Logic FlatFile Connector Custom HR System midpoint Identity Repository (Relational DB) DB Table Connector Oracle Database Database Applications
38 User Details
39 Approval Work Items (Workflow)
40 Approval (Workflow)
41 Resource and System Diagnostics
42 Built-it XML Editor
43 Live Demo Documentation: search for Live demo in wiki.evolveum.com
44 Conclusion
45 (Much) More Information midpoint Wiki Architecture and Design (in Wiki) Wiki pages under [Architecture and Design] page Live architecture documentation Includes UML diagrams We try to keep it (reasonably) up to date midpoint Mailing List
46 Conclusion Identity Management Goal: Operational efficiency & security (audit) Easy to start, complex to maintain midpoint Commercial open source provisioning system Next generation system: new technologies and unique features Customer influence and participation
47 Questions and Answers
48 Thank You Radovan Semančík
Open Source Identity Management
Open Source Management OpenAlt 2015 Radovan Semančík November 2015 Ing. Radovan Semančík, PhD. Software architect Co-owner of Evolveum (open source company) Architect of midpoint project Apache committer
More informationIdentity Management with midpoint. Radovan Semančík FOSDEM, January 2016
Management with midpoint Radovan Semančík FOSDEM, January 2016 Radovan Semančík Current: Software Architect at Evolveum Architect of Evolveum midpoint Contributor to ConnId and Apache Directory API Past:
More informationSecuring your business
Securing your business Anders Askåsen Product Manager for OpenIDM * World Wide Coverage ForgeRock.com Enterprise Open Source Software ForgeRock Norway ForgeRock USA ForgeRock UK ForgeRock France Consulting
More informationIntroduction to Identity and Access Management for the engineers. Radovan Semančík April 2014
Introduction to Identity and Access Management for the engineers Radovan Semančík April 2014 How it works now? Manager Admin Login Users Login Admin Login Login Login Theory Manager Admin Forgot password
More informationG Cloud 6 CDG Service Definition for Forgerock Software Services
G Cloud 6 CDG Service Definition for Forgerock Software Services Author: CDG Date: October 2015 Table of Contents Table of Contents 2 1.0 Service Definition 3 1.0 Service Definition Forgerock as a Platform
More informationApache Syncope OpenSource IdM
Apache Syncope OpenSource IdM Managing Identities in Enterprise Environments Version 1.3 / 2012-07-26 Apache Syncope OpenSource IdM by http://syncope.tirasa.net/ is licensed under a Creative Commons Attribution
More informationLSC @ LDAPCON. 2011. Sébastien Bahloul
LSC @ LDAPCON. 2011 Sébastien Bahloul About me Developer and software architect 10 years experience in IAM Recently hired as product manager by a French security editor, Dictao, providing : personal and
More informationTech Brief: Upgrading from Sun IAM to ForgeRock Open Identity Stack
White Paper Tech Brief: Upgrading from Sun IAM to ForgeRock Open Identity Stack 1. Overview 2. OpenAM 3. OpenIDM 4. OpenDJ 5. Getting Started Tech Brief: Upgrading from Sun IAM to ForgeRock Open Identity
More informationWHITEPAPER OpenIDM. Identity lifecycle management for users, devices, & things
WHITEPAPER OpenIDM Identity lifecycle management for users, devices, & things Introduction Organizations of all sizes employ a variety of different approaches to manage identity administration and provisioning
More informationSAP Identity Management Overview
Identity Management Overview October 2014 Public Agenda Introduction to Identity Management Role Management and Workflows Business-Driven Identity Management Compliant Identity Management Reporting Password
More informationEnterprise Open Source Identity Middleware. Anders Askåsen, Product Manager
Enterprise Open Source Identity Middleware Anders Askåsen, Product Manager The Day the Music Died Our Mission ForgeRock is an independent software vendor (ISV), whose core mission is to deliver an enterprise-class
More informationWHITEPAPER ForgeRock Identity Management. Identity lifecycle management for users, devices, and things
WHITEPAPER ForgeRock Identity Management Identity lifecycle management for users, devices, and things Introduction Organizations of all sizes employ a variety of different approaches to manage identity
More informationFirst-hand Information about the Enhanced Functionality and Integration Options Within SAP NetWeaver Identity Management 7.2
First-hand Information about the Enhanced Functionality and Integration Options Within SAP NetWeaver Identity Management 7.2 SAP Product Management, SAP NetWeaver Identity Management & Security Kristian
More informationSAM Enterprise Identity Manager
SAM Enterprise Identity Manager The Next IAM Generation New, rich, full-featured business process workflow capabilities Multi-level segregation of duties management and reporting Easy-to-use and secure
More informationAccess Management Analysis of some available solutions
Access Management Analysis of some available solutions Enterprise Security & Risk Management May 2015 Authors: Yogesh Kumar Sharma, Kinshuk De, Dr. Sundeep Oberoi Access Management - Analysis of some available
More informationEnterprise Identity Management Reference Architecture
Enterprise Identity Management Reference Architecture Umut Ceyhan Principal Sales Consultant, IDM SEE Agenda Introduction Virtualization Access Management Provisioning Demo Architecture
More informationHow to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions
How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions Introduction This paper provides an overview of the integrated solution and a summary of implementation options
More informationHow to Get Rich By Working on Open Source Project? Radovan Semančík March 2015
How to Get Rich By Working on Open Source Project? Radovan Semančík March 2015 How to get rich by working on open source project? Management Summary: It's hard. And slow. But it may be possible. MAKE MONEY
More informationCommuniqué 4. Standardized Global Content Management. Designed for World s Leading Enterprises. Industry Leading Products & Platform
Communiqué 4 Standardized Communiqué 4 - fully implementing the JCR (JSR 170) Content Repository Standard, managing digital business information, applications and processes through the web. Communiqué
More informationIBM Tivoli Identity Manager
Automated, role-based user management and provisioning of user services IBM Tivoli Identity Manager Reduce help-desk costs and IT staff workload with Web self-service and password reset/synch interfaces
More informationIBM WebSphere Cast Iron Cloud Integration
IBM WebSphere Cast Iron Cloud Integration Andrew Daniel Katherine Sanders adaniel@uk.ibm.com katherine_sanders@uk.ibm.com Agenda Cast Iron Overview What's New Cast Iron Express with Demo What's New Additional
More informationIdentity Management Basics. OWASP May 9, 2007. The OWASP Foundation. Derek Browne, CISSP, ISSAP Derek.Browne@Emergis.com. http://www.owasp.
Identity Management Basics Derek Browne, CISSP, ISSAP Derek.Browne@Emergis.com May 9, 2007 Copyright The Foundation Permission is granted to copy, distribute and/or modify this document under the terms
More informationThe Unique Alternative to the Big Four. Identity and Access Management
The Unique Alternative to the Big Four Identity and Access Management Agenda Introductions Identity and Access Management (I&AM) Overview Benefits of I&AM I&AM Best Practices I&AM Market Place Closing
More informationIBM Tivoli Directory Integrator
IBM Tivoli Directory Integrator Synchronize data across multiple repositories Highlights Transforms, moves and synchronizes generic as well as identity data residing in heterogeneous directories, databases,
More informationBusiness Process Management with @enterprise
Business Process Management with @enterprise March 2014 Groiss Informatics GmbH 1 Introduction Process orientation enables modern organizations to focus on the valueadding core processes and increase
More informationOracleAS Identity Management Solving Real World Problems
OracleAS Identity Management Solving Real World Problems Web applications are great... Inexpensive development Rapid deployment Access from anywhere BUT. but they can be an administrative and usability
More informationSAP Identity Management Overview
Identity Management Overview Public May 2016 Agenda Introduction to Identity Management Role Management and Workflows Business-Driven Identity Management Compliant Identity Management Reporting Password
More informationOracle Mobile Security Suite. René Klomp 6 mei 2014
Oracle Mobile Security Suite René Klomp 6 mei 2014 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be
More informationIdentity Governance Evolution
Identity Governance Evolution Paola Marino Principal Sales Consultant Agenda Oracle Identity Governance Innovation Cloud Scenarios enabled by Oracle Identity Platform Agenda Oracle
More informationOracle Identity Manager, Oracle Internet Directory
Oracle Identity Manager (OIM) is a user provisioning system. It defines properties for how users and groups get authorized to access compute and content resources across the enterprise. Identity Management
More informationThese requirements led to several challenges in deploying identity related applications within the enterprise:
2 3 Directory services are key building blocks for secure identity-enabled business applications and the underlying enterprise identity management (IdM) architecture. Well-structured and organized directory
More informationOracle Reference Architecture and Oracle Cloud
Oracle Reference Architecture and Oracle Cloud Anbu Krishnaswamy Anbarasu Enterprise Architect Social. Mobile. Complete. Global Enterprise Architecture Program Safe Harbor Statement The following is intended
More informationThe Circle of Life: Protecting Your Sun IAM Investment with ForgeRock s Open Identity Stack (formerly Sun Open Source IAM)
White Paper The Circle of Life: Protecting Your Sun IAM Investment with ForgeRock s Open Identity Stack (formerly Sun Open Source IAM) 1. Overview 2. Understanding the Options 3. Solving the Customer Problem
More informationOracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success
Oracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success Manvendra Kumar AST Corporation, IL Scott Brinker College of American Pathologist, IL August
More informationOracle Identity Analytics Architecture. An Oracle White Paper July 2010
Oracle Identity Analytics Architecture An Oracle White Paper July 2010 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may
More informationCentralized Oracle Database Authentication and Authorization in a Directory
Centralized Oracle Database Authentication and Authorization in a Directory Paul Sullivan Paul.J.Sullivan@oracle.com Principal Security Consultant Kevin Moulton Kevin.moulton@oracle.com Senior Manager,
More informationMigration and Developer Productivity Solutions Retargeting IT for Emerging Business Needs
Migration and Developer Productivity Solutions Retargeting IT for Emerging Business Needs Charles Finley Transformix Computer Corporation Who We Are Transformix provides software solutions and services
More informationIdentity Management to support Hybrid Cloud environments at higher education institutions
Identity Management to support Hybrid Cloud environments at higher education institutions Lessons learnt at the Technische Universität München and the Leibniz Supercomputing Centre EUNIS 2011 Silvia Knittl,
More informationApache Sentry. Prasad Mujumdar prasadm@apache.org prasadm@cloudera.com
Apache Sentry Prasad Mujumdar prasadm@apache.org prasadm@cloudera.com Agenda Various aspects of data security Apache Sentry for authorization Key concepts of Apache Sentry Sentry features Sentry architecture
More informationcan I customize my identity management deployment without extensive coding and services?
SOLUTION BRIEF Connector Xpress and Policy Xpress Utilities in CA IdentityMinder can I customize my identity management deployment without extensive coding and services? agility made possible You can.
More informationActive Directory Manager Pro 5.0.0.0 New Features
Active Directory Manager Pro 5.0.0.0 New Features General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com
More informationSecurity As A Service Leveraged by Apache Projects. Oliver Wulff, Talend
Security As A Service Leveraged by Apache Projects Oliver Wulff, Talend Application Security Landscape 2 Solution Building blocks Apache CXF Fediz Single Sign On (WS-Federation) Attribute Based Access
More informationHow To Make A Multi-Tenant Platform Secure And Secure
Authentication As A Service Why new Cloud based Authentication solutions will be adopted by about 50% of the companies by 2017? Jason Hart CISSP CISM VP Cloud Solutions What a great world Today's World
More informationSAP NetWeaver Identity
SAP NetWeaver SAP NetWeaver Identity Management: The Time Is Now Replace CUA Set a Strategic Course in User Administration CONTENT 4 Bring New Efficiency to Your User Administration 5 At Home in Every
More informationOracle Role Manager. An Oracle White Paper Updated June 2009
Oracle Role Manager An Oracle White Paper Updated June 2009 Oracle Role Manager Introduction... 3 Key Benefits... 3 Features... 5 Enterprise Role Lifecycle Management... 5 Organization and Relationship
More informationOracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003
Oracle Identity Management Concepts and Architecture An Oracle White Paper December 2003 Oracle Identity Management Concepts and Architecture Introduction... 3 Identity management... 3 What is Identity
More informationIBM Rational Asset Manager
Providing business intelligence for your software assets IBM Rational Asset Manager Highlights A collaborative software development asset management solution, IBM Enabling effective asset management Rational
More informationBOF4803 Open source identity and access management. 1 October 2012 5:30p San Francisco CA
Open source identity and access management 1 October 2012 5:30p San Francisco CA slide 2 Expert Panel Ludovic Poitou, ForgeRock Matt Hardin, Symas Pascal Jakobi, Thales Group Shawn McKinney, JoshuaTree
More informationSisense. Product Highlights. www.sisense.com
Sisense Product Highlights Introduction Sisense is a business intelligence solution that simplifies analytics for complex data by offering an end-to-end platform that lets users easily prepare and analyze
More information100% NO CODING NO DEVELOPING IMMEDIATE BUSINESS -25% -70% UNLIMITED SCALABILITY DEVELOPMENT TIME SOFTWARE STABILITY
100% UNLIMITED SCALABILITY TOTAL COST OF OWNERSHIP -25% +50% EFFICENCY INCREASE -70% +65% DEVELOPMENT TIME SOFTWARE STABILITY NO CODING NO DEVELOPING IMMEDIATE BUSINESS FlexyGo Rapid Application Builder
More information<Insert Picture Here> Move to Oracle Database with Oracle SQL Developer Migrations
Move to Oracle Database with Oracle SQL Developer Migrations The following is intended to outline our general product direction. It is intended for information purposes only, and
More informationThree Campus Case Studies: Managing Access with Grouper
Three Campus Case Studies: Managing Access with Grouper IAM Online March 13, 2013 Speakers: Paul Donahue and Keith Hazelton, University of Wisconsin-Madison Sébastien Gagné, University of Montreal Rahul
More informationCan I customize my identity management deployment without extensive coding and services?
SOLUTION BRIEF CONNECTOR XPRESS AND POLICY XPRESS UTILITIES IN CA IDENTITY MANAGER Can I customize my identity management deployment without extensive coding and services? SOLUTION BRIEF CA DATABASE MANAGEMENT
More informationTrust but Verify: Best Practices for Monitoring Privileged Users
Trust but Verify: Best Practices for Monitoring Privileged Users Olaf Stullich, Product Manager (olaf.stullich@oracle.com) Arun Theebaprakasam, Development Manager Chirag Andani, Vice President, Identity
More informationDocumentation. CloudAnywhere. http://www.cloudiway.com. Page 1
Documentation CloudAnywhere http://www.cloudiway.com Page 1 Table of Contents 1 INTRODUCTION 3 2 OVERVIEW 4 2.1 KEY FUNCTIONALITY 4 2.2 PREREQUISITES 5 3 FEATURES 6 3.1 A UNIVERSAL PROVISIONING SOLUTION.
More informationActiveRoles Server v 6.7
ActiveRoles Server v 6.7 Slide Index Learning Objectives- Slide #3 Product Overview- Slides#4-9 Installation- Slides#16,17 Free Tools- Slides #18-22 Solutions-Slides #23,24 Role Delgation-Slides#25-30
More informationtibbr Now, the Information Finds You.
tibbr Now, the Information Finds You. - tibbr Integration 1 tibbr Integration: Get More from Your Existing Enterprise Systems and Improve Business Process tibbr empowers IT to integrate the enterprise
More informationTG Web. Technical FAQ
TG Web Technical FAQ About this FAQ We encourage you to contact us if. You can't find the information you're looking for. You would like to discuss your specific testing requirements in more detail. You
More informationAuthentication: Password Madness
Authentication: Password Madness MSIT 458: Information Security Group Presentation The Locals Password Resets United Airlines = 83,000 employees Over 13,000 password reset requests each month through the
More informationKey New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance
Key New Capabilities Complete, Open, Integrated Oracle Analytics 11g: Intelligence and Governance Paola Marino Principal Sales Consultant, Management Agenda Drivers Oracle Analytics
More informationHow to Get to Single Sign-On
How to Get to Single Sign-On Gregg Kreizman Neil Wynne Twitter: @neilwynne Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in
More information1 Introduction... 2 2 Product Description... 2 3 Strengths and Challenges... 4 4 Copyright... 5
KuppingerCole Report EXECUTIVE VIEW by Martin Kuppinger April 2015 ITMC, a Danish vendor, delivers a comprehensive solution for Identity Provisioning and Access Governance with its IDM365 product. The
More informationIdentity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
More informationIDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach
IDENTITY MANAGEMENT AND WEB SECURITY A Customer s Pragmatic Approach AGENDA What is Identity Management (IDM) or Identity and Access Management (IAM)? Benefits of IDM IDM Best Practices Challenges to Implement
More informationIdentity Access Management Challenges and Best Practices
Identity Access Management Challenges and Best Practices Mr. Todd Rossin, Managing Director/Founder IDMWorks Special Thanks to JHU APL for providing the Parsons Auditorium for our use this evening 1 December
More informationOracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004
Oracle Identity Management: Integration with Windows An Oracle White Paper December. 2004 Oracle Identity Management: Integration with Windows Introduction... 3 Goals for Windows Integration... 4 Directory
More informationAuthentication Integration
Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication
More informationInside the Digital Commerce Engine. The architecture and deployment of the Elastic Path Digital Commerce Engine
Inside the Digital Commerce Engine The architecture and deployment of the Elastic Path Digital Commerce Engine Contents Executive Summary... 3 Introduction... 4 What is the Digital Commerce Engine?...
More informationHP OO 10.X - SiteScope Monitoring Templates
HP OO Community Guides HP OO 10.X - SiteScope Monitoring Templates As with any application continuous automated monitoring is key. Monitoring is important in order to quickly identify potential issues,
More informationTake Control of Identities & Data Loss. Vipul Kumra
Take Control of Identities & Data Loss Vipul Kumra Security Risks - Results Whom you should fear the most when it comes to securing your environment? 4. 3. 2. 1. Hackers / script kiddies Insiders Ex-employees
More informationCategory: Business Process and Integration Solution for Small Business and the Enterprise
Home About us Contact us Careers Online Resources Site Map Products Demo Center Support Customers Resources News Download Article in PDF Version Download Diagrams in PDF Version Microsoft Partner Conference
More informationProfessional Profile
Plex Plain GmbH Professional Profile Markus Tobler Current: 16.05.2013 Managerial Project Experience (excerpt, last three years) Responsibility Duration Team Budget and Delivery (full) Team Lead Budget
More information300+ APIs Everywhere
300+ APIs Everywhere API Management Microsoft Azure Monetize Transform Create Drive digital assets product to platform content channels internal agility API MANAGEMENT An API program is the foundation
More informationCross-domain Identity Management System for Cloud Environment
Cross-domain Identity Management System for Cloud Environment P R E S E N T E D B Y: N A Z I A A K H TA R A I S H A S A J I D M. S O H A I B FA R O O Q I T E A M L E A D : U M M E - H A B I B A T H E S
More informationEasy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant
Easy as 1-2-3: The Steps to XE Mark Hoye Services Portfolio Consultant September 25, 2015 Objective / Agenda Objective Provide relevant information about Banner XE Provide a framework for understanding
More informationGet Cloud Ready: Secure Access to Google Apps and Other SaaS Applications
Get Cloud Ready: Secure Access to Google Apps and Other SaaS Applications Matt Weisberg Vice President & CIO, Weisberg Consulting, Inc. matt@weisberg.net Paul McKeith Technical Sales, Novell, Inc. pmckeith@novell.com
More informationSingle Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
More informationServer-side OSGi with Apache Sling. Felix Meschberger Day Management AG 124
Server-side OSGi with Apache Sling Felix Meschberger Day Management AG 124 About Felix Meschberger > Senior Developer, Day Management AG > fmeschbe@day.com > http://blog.meschberger.ch > VP Apache Sling
More informationPro<DOC/> e-commerce Technology An Introduction
Pro e-commerce Technology An Introduction From Rightangle Technologies Private Limited (www.rigthangle.co.in) 1 P a g e R i g h t a n g l e T e c h n o l o g i e s P v t. L t d. 1 Problem Statement
More informationBala Vellaiappan Shan Balasubramanian Suchitra Subbakrishna DTS-ESOD
AccessMCG Extranet Bala Vellaiappan Shan Balasubramanian Suchitra Subbakrishna DTS-ESOD AGENDA Introduction Business Requirements and Scope AccessMCG Extranet DEMO Questions Challenges Customer satisfaction
More informationOracle Audit Vault and Database Firewall. Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska
Oracle Audit Vault and Database Firewall Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska The following is intended to outline our general product direction. It is intended for information
More informationGovernment of Canada Directory Services Architecture. Presentation to the Architecture Framework Advisory Committee November 4, 2013
Government of Canada Directory Services Architecture Presentation to the Architecture Framework Advisory Committee November 4, 2013 1 Agenda TIME TOPICS PRESENTERS 9:00 9:15 Opening Remarks Objective for
More information1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges
1 Building an Identity Management Business Case Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Justifying investment in identity management automation. 2 Agenda Business challenges
More informationEXECUTIVE VIEW. EmpowerID 2013. KuppingerCole Report. By Peter Cummings October 2013. By Peter Cummings pc@kuppingercole.
KuppingerCole Report EXECUTIVE VIEW By Peter Cummings October 2013 EmpowerID 2013 By Peter Cummings pc@kuppingercole.com October 2013 Content 1 Vendor Profile... 3 2 Product Description... 4 2.1 Single
More informationActive Directory Implemenation
Active Directory Implemenation For PowerBuilder, Appeon Web & Appeon Mobile Powered by Sponsored by An Actual Implementation Case Study! By Chris Pollach President: Software Tool & Die Inc. Ottawa, Canada
More informationOracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007
Oracle Identity Management for SAP in Heterogeneous IT Environments An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments Executive Overview... 3 Introduction...
More informationTEST AUTOMATION FRAMEWORK
TEST AUTOMATION FRAMEWORK Twister Topics Quick introduction Use cases High Level Description Benefits Next steps Twister How to get Twister is an open source test automation framework. The code, user guide
More informationOpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.
OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere. OpenAM, the only all-in-one open source access management solution, provides the
More informationRSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation
RSA Via Lifecycle and Governance 101 Getting Started with a Solid Foundation Early Identity and Access Management Early IAM was all about Provisioning IT tools to solve an IT productivity problem Meet
More informationNovell Identity Manager
AUTHORIZED DOCUMENTATION Overview Guide Novell Identity Manager 4.0.1 April 15, 2011 www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use
More informationProduct overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities
PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to
More informationCA Federation Manager
PRODUCT BRIEF: CA FEDERATION MANAGER CA FEDERATION MANAGER PROVIDES STANDARDS-BASED IDENTITY FEDERATION CAPABILITIES THAT ENABLE THE USERS OF ONE ORGANIZATION TO EASILY AND SECURELY ACCESS THE DATA AND
More informationOracle Primavera Gateway
Oracle Primavera Gateway Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is
More informationBONITA, The Open Source BPM Solution
BONITA, The Open Source BPM Solution «BPM, The Future is Now!»! Miguel Valdes Faura Bull R&D, BPM Manager Agenda Why BPM Matters? BPM Market Review Bonita in simple words Architecture Products and Components
More information1 Copyright 2011, Oracle and/or its affiliates. All rights reserved.
1 Copyright 2011, Oracle and/or its affiliates. All rights ORACLE PRODUCT LOGO Session ID: 17202 Oracle Fusion Applications - Technology Essentials Overview Nadia Bendjedou Senior Director Product Strategy,
More informationAspire Systems - Experience in Digital Marketing and Social Media
Case Study Aspire Systems - Experience in Digital Table of Contents 1. Digital agency s email marketing platform goes on-demand 2. Social media launch for a major apparel company 3. Mobile CRM empowerment
More informationCopyright 2012, Oracle and/or its affiliates. All rights reserved.
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Oracle Cloud Services Mike Lehmann Senior Director of Product Management WebLogic Server, Java Cloud Services, Coherence and Java EE
More informationPopulating Your Domino Directory (Or ANY Domino Database) With Tivoli Directory Integrator. Marie Scott Thomas Duffbert Duff
Populating Your Domino Directory (Or ANY Domino Database) With Tivoli Directory Integrator Marie Scott Thomas Duffbert Duff Agenda Introduction to TDI architecture/concepts Discuss TDI entitlement Examples
More informationGabriel Magariño. Software Engineer. gabriel.magarino@gmail.com. www.javapassion.com/idm. Overview Revisited
Gabriel Magariño Software Engineer gabriel.magarino@gmail.com www.javapassion.com/idm Overview Revisited Disclaimer and Acknowledgments The contents here are created as a own personal endeavor and thus
More information