midpoint Overview Radovan Semančík December 2015

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "midpoint Overview Radovan Semančík December 2015"

Transcription

1 midpoint Overview Radovan Semančík December 2015

2 Agenda Identity Management Introduction midpoint Introduction midpoint Architecture Conclusion

3 Identity Management Introduction

4 Identity Management System Admin Requester Approver Users Application Application Provisioning System Identity Repository Application HR Application CRM Application A M

5 Identity Management: Provisioning Making sure that users have the correct access rights Automating the processes of access right management Hiring new employee: creating accounts Reorg: modifications of access privileges Layoffs: deleting/disabling accounts Visibility and security Audits, attestations, reporting

6 User Provisioning System HR Workflow Engine LDAP Domain SOAP Agent SQL ERP Legacy System Database Applications

7 About Evolveum

8 Evolveum Team History since approx various LDAP and IDM projects, various companies since 2004: nlight IDM Professional Services Sun Microsystems, Novell : Cooperation with ForgeRock Contributing to OpenIDM v1 2011: Evolveum Independent development of midpoint Cooperative business model

9 Evolveum Focused open source development company Almost all employees are engineers Development and research Minimalistic sales and marketing All team members have academic degree (including 2 PhDs) Indirect partner-based business Customer Partner Evolveum Cooperation is the key

10 Ecosystem Pure open source model No open-core or dual licencing Contributions are welcome Distributed development Code created by several development teams Coordinated and integrated by Evolveum Evolveum is a maintainer, not owner of the code Cooperation instead of domination Evolveum partners add value Cloud, integrated solutions, managed services, extensions, plugins, connectors,... Trade influence for control to get mutual benefits

11 Open Source Identity Ecosystem OSIAM (Access Management) Shibboleth (Federation) (GRC) Syncope (Identity Provisioning) (Access Management) midpoint (Identity Provisioning) ConnId (Identity Connectors) (Identity Repository) 389 Directory Server (Identity Repository) CAS (Single Sign-On) Fortress (IAM SDK) OpenLDAP (Directory Server)

12 midpoint Introduction

13 MidPoint at a Glance Open-source User Provisioning system 100% open-source, no licence cost, no usage restrictions Next-generation system Open architecture, extensible, standard-based, Java/XML/REST Deployment and maintenance efficiency 20% of effort to get 80% of result Based on a decade of IDM experience

14 MidPoint Big Picture Target Systems midpoint Source Systems Identity Connectors

15 midpoint Features Overview Identity Lifecycle Management Hiring people, firing people, changing assignments RBAC, workflows, processes, rules, policies Identity Integration Connectors for source and target systems ( resources ) Customizable and Extensible Extensible using expressions and plug-ins (open-closed principle) High-level standard languages (Groovy, JavaScript, XPath2, BPMN) 100% open source, maven, git

16 Inside midpoint Modern lightweight Java architecture Spring, Spring Security, Prism Objects, Wicket Extensible by scripting expressions Groovy, Python, JavaScript, XPath v2,... Connectors Polygon, ConnId, OpenICF External services REST, SOAP/WSDL Workflow Activiti BPM engine integration

17 Unique Features Completely open Open source, open development process, customize anything Works out-of-the-box Many IDM configurations already pre-implemented Advanced RBAC/ABAC Conditional roles, parametric roles, Relative Changes, Synchronization and Consistency Easy to maintain consistency, lock-free, self-healing system PrismObjects Dynamic schemas, customization, unifying XML and JSON

18 MidPoint in numbers At least 13 years of IDM experience At least 11 years of research (12 publications) More than 5 years of active development (13 releases) More than lines of code Estimated project cost: $ (COCOMO, openhub.net) Average 100 commits per month (total 9007 commits) More than 3300 automated tests More than 500 wiki pages containing documentation

19 The past, the present and the future

20 midpoint History 2004: nlight IDM specialist company Mostly Sun IDM (but also other technologies) 2009: Sun acquired by Oracle Death of Sun IDM.. end of business? Spring 2010: OpenIDMv1 nlight cooperating with ForgeRock on OpenIDM development Spring 2011: ForgeRock is changing course OpenIDMv2 plan: drop everything, reinvent everything May 2011: midpoint project start Evolveum established by nlight and others 2012 and on: independent development Technolgical leadership Cooperation with other open source companies: Identity Ecosystem

21 Current State (version 3.2) Rich provisioning functionality (mappings, scripting,...) Live synchronization, reconciliation, import Advanced RBAC, organizational structure Administration GUI Generic synchronization, entitlements Fine-grained authorizations, delegated administration Advanced features Time constraints, higher-order dependencies, consistency, Governance (technology preview)

22 Where is midpoint used

23 Roadmap MidPoint 3.0 (Newton) RELEASED New look and feel, usability improvements MidPoint 3.4 RELEASED Access certification (preview), MidPoint 3.3 (Lincoln) RELEASED Improved GUI, wizards, MidPoint 3.2 (Tycho) Delegated administration, generic sync, REST, MidPoint 3.1, (Sinan) RELEASED Access certification, synchronization GUI, Spring 2015

24 MidPoint 3.x Is Revolutionary It goes beyond Identity Management Generic Synchronization Synchronize everything with everything Entitlements Support for groups and privileges (PIM) REST (and JSON and YAML later) Delegated Administration Fine-grained authorizations + organizational structure New GUI Look and Feel - Customizable

25 Open and Dynamic Development Completely open development Public distributed source code management (git, planned soon) Public task tracking (Jira) Public communication and documentation (mailing lists, wiki) Public planning (roadmap, Jira) User (customer) participation (Paying) customers influence roadmap and take precedence MidPoint users can influence the development plan Contributions

26 midpoint Architecture

27 MidPoint Big Picture Target Systems midpoint Source Systems Identity Connectors

28 Internal Architecture midpoint Administrators Users User Interface User Interface Business Logic Resources IDM Model Provisioning Repository

29 Internal Architecture Custom User Interface Administrators Users Admin User Interface Business Logic (workflow) Processing the policies IDM Model RBAC, mappings, conditions,... Relational Database Provisioning Repository ConnId Identity Connector Framework Resources

30 Internal Architecture Administrators Users User Interface User Interface Customized Fixed ( off the shelf ) Business Logic IDM Model Resources Provisioning Repository

31 Internal Architecture User Interface Part Extensible User Interface Deployer/Customer may provide his own code, Administrators extend the interfaces, even replace some Users Business Logic components Customized Fixed ( off the shelf ) IDM Model Configurable Part Provisioning Deployer/Customer should only configure the components here. The structure and code Repository should not be changed. Resources

32 Technologies Platform: Lightweight Java Java, Spring, Spring Security, Backlog (SLF4J) Data Model: Prism Objects (generated from XML Schemas) Web GUI (AJAX): Wicket Business logic and customization Groovy, JavaScript or XPath v2 for mappings and expressions Activiti BPM Workflow Interfaces: Java API, SOAP and REST Java APIs most efficient (parts of midpoint are embeddable) Web services (SOAP/WSDL, full schema support) REST interface

33 Identity Connectors Common Identity Connector Framework Sun Identity Connector Framework ConnId Compatible connectors AD, DB Table, DB2, MySQL, Oracle, RACF, Solaris, SPML, VMS, FlatFile, XML, Solaris, SAP,... LDAP: OpenLDAP, 389ds, OpenDJ, edirectory, Active Directory CSV file, Office365, SAS, GitLab, Lotus, LifeRay

34 Concrete Architecture - Web Container (Application Server) J2EE Web Container midpoint GUI Web Service Provisioning Model Repository RDB

35 Architecture Documentation UML Model (astah*)

36 midpoint Deployment Example

37 Example midpoint Deployment Architecture Microsoft Applications Administrator AD Connector (remote) midpoint User Self-Service (Web GUI) Identity Management Policies (rules, processes) Web GUI Scheduled Exports ADSI Active Directory CSV File SQL IDM Logic FlatFile Connector Custom HR System midpoint Identity Repository (Relational DB) DB Table Connector Oracle Database Database Applications

38 User Details

39 Approval Work Items (Workflow)

40 Approval (Workflow)

41 Resource and System Diagnostics

42 Built-it XML Editor

43 Live Demo Documentation: search for Live demo in wiki.evolveum.com

44 Conclusion

45 (Much) More Information midpoint Wiki Architecture and Design (in Wiki) Wiki pages under [Architecture and Design] page Live architecture documentation Includes UML diagrams We try to keep it (reasonably) up to date midpoint Mailing List

46 Conclusion Identity Management Goal: Operational efficiency & security (audit) Easy to start, complex to maintain midpoint Commercial open source provisioning system Next generation system: new technologies and unique features Customer influence and participation

47 Questions and Answers

48 Thank You Radovan Semančík

Open Source Identity Management

Open Source Identity Management Open Source Management OpenAlt 2015 Radovan Semančík November 2015 Ing. Radovan Semančík, PhD. Software architect Co-owner of Evolveum (open source company) Architect of midpoint project Apache committer

More information

Identity Management with midpoint. Radovan Semančík FOSDEM, January 2016

Identity Management with midpoint. Radovan Semančík FOSDEM, January 2016 Management with midpoint Radovan Semančík FOSDEM, January 2016 Radovan Semančík Current: Software Architect at Evolveum Architect of Evolveum midpoint Contributor to ConnId and Apache Directory API Past:

More information

Securing your business

Securing your business Securing your business Anders Askåsen Product Manager for OpenIDM * World Wide Coverage ForgeRock.com Enterprise Open Source Software ForgeRock Norway ForgeRock USA ForgeRock UK ForgeRock France Consulting

More information

Introduction to Identity and Access Management for the engineers. Radovan Semančík April 2014

Introduction to Identity and Access Management for the engineers. Radovan Semančík April 2014 Introduction to Identity and Access Management for the engineers Radovan Semančík April 2014 How it works now? Manager Admin Login Users Login Admin Login Login Login Theory Manager Admin Forgot password

More information

G Cloud 6 CDG Service Definition for Forgerock Software Services

G Cloud 6 CDG Service Definition for Forgerock Software Services G Cloud 6 CDG Service Definition for Forgerock Software Services Author: CDG Date: October 2015 Table of Contents Table of Contents 2 1.0 Service Definition 3 1.0 Service Definition Forgerock as a Platform

More information

Apache Syncope OpenSource IdM

Apache Syncope OpenSource IdM Apache Syncope OpenSource IdM Managing Identities in Enterprise Environments Version 1.3 / 2012-07-26 Apache Syncope OpenSource IdM by http://syncope.tirasa.net/ is licensed under a Creative Commons Attribution

More information

LSC @ LDAPCON. 2011. Sébastien Bahloul

LSC @ LDAPCON. 2011. Sébastien Bahloul LSC @ LDAPCON. 2011 Sébastien Bahloul About me Developer and software architect 10 years experience in IAM Recently hired as product manager by a French security editor, Dictao, providing : personal and

More information

Tech Brief: Upgrading from Sun IAM to ForgeRock Open Identity Stack

Tech Brief: Upgrading from Sun IAM to ForgeRock Open Identity Stack White Paper Tech Brief: Upgrading from Sun IAM to ForgeRock Open Identity Stack 1. Overview 2. OpenAM 3. OpenIDM 4. OpenDJ 5. Getting Started Tech Brief: Upgrading from Sun IAM to ForgeRock Open Identity

More information

WHITEPAPER OpenIDM. Identity lifecycle management for users, devices, & things

WHITEPAPER OpenIDM. Identity lifecycle management for users, devices, & things WHITEPAPER OpenIDM Identity lifecycle management for users, devices, & things Introduction Organizations of all sizes employ a variety of different approaches to manage identity administration and provisioning

More information

WHITEPAPER ForgeRock Identity Management. Identity lifecycle management for users, devices, and things

WHITEPAPER ForgeRock Identity Management. Identity lifecycle management for users, devices, and things WHITEPAPER ForgeRock Identity Management Identity lifecycle management for users, devices, and things Introduction Organizations of all sizes employ a variety of different approaches to manage identity

More information

Enterprise Open Source Identity Middleware. Anders Askåsen, Product Manager

Enterprise Open Source Identity Middleware. Anders Askåsen, Product Manager Enterprise Open Source Identity Middleware Anders Askåsen, Product Manager The Day the Music Died Our Mission ForgeRock is an independent software vendor (ISV), whose core mission is to deliver an enterprise-class

More information

First-hand Information about the Enhanced Functionality and Integration Options Within SAP NetWeaver Identity Management 7.2

First-hand Information about the Enhanced Functionality and Integration Options Within SAP NetWeaver Identity Management 7.2 First-hand Information about the Enhanced Functionality and Integration Options Within SAP NetWeaver Identity Management 7.2 SAP Product Management, SAP NetWeaver Identity Management & Security Kristian

More information

SAM Enterprise Identity Manager

SAM Enterprise Identity Manager SAM Enterprise Identity Manager The Next IAM Generation New, rich, full-featured business process workflow capabilities Multi-level segregation of duties management and reporting Easy-to-use and secure

More information

SAP Identity Management Overview

SAP Identity Management Overview Identity Management Overview October 2014 Public Agenda Introduction to Identity Management Role Management and Workflows Business-Driven Identity Management Compliant Identity Management Reporting Password

More information

Access Management Analysis of some available solutions

Access Management Analysis of some available solutions Access Management Analysis of some available solutions Enterprise Security & Risk Management May 2015 Authors: Yogesh Kumar Sharma, Kinshuk De, Dr. Sundeep Oberoi Access Management - Analysis of some available

More information

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions Introduction This paper provides an overview of the integrated solution and a summary of implementation options

More information

Enterprise Identity Management Reference Architecture

Enterprise Identity Management Reference Architecture Enterprise Identity Management Reference Architecture Umut Ceyhan Principal Sales Consultant, IDM SEE Agenda Introduction Virtualization Access Management Provisioning Demo Architecture

More information

IBM Tivoli Identity Manager

IBM Tivoli Identity Manager Automated, role-based user management and provisioning of user services IBM Tivoli Identity Manager Reduce help-desk costs and IT staff workload with Web self-service and password reset/synch interfaces

More information

Communiqué 4. Standardized Global Content Management. Designed for World s Leading Enterprises. Industry Leading Products & Platform

Communiqué 4. Standardized Global Content Management. Designed for World s Leading Enterprises. Industry Leading Products & Platform Communiqué 4 Standardized Communiqué 4 - fully implementing the JCR (JSR 170) Content Repository Standard, managing digital business information, applications and processes through the web. Communiqué

More information

How to Get Rich By Working on Open Source Project? Radovan Semančík March 2015

How to Get Rich By Working on Open Source Project? Radovan Semančík March 2015 How to Get Rich By Working on Open Source Project? Radovan Semančík March 2015 How to get rich by working on open source project? Management Summary: It's hard. And slow. But it may be possible. MAKE MONEY

More information

IBM Tivoli Directory Integrator

IBM Tivoli Directory Integrator IBM Tivoli Directory Integrator Synchronize data across multiple repositories Highlights Transforms, moves and synchronizes generic as well as identity data residing in heterogeneous directories, databases,

More information

Identity Management Basics. OWASP May 9, 2007. The OWASP Foundation. Derek Browne, CISSP, ISSAP Derek.Browne@Emergis.com. http://www.owasp.

Identity Management Basics. OWASP May 9, 2007. The OWASP Foundation. Derek Browne, CISSP, ISSAP Derek.Browne@Emergis.com. http://www.owasp. Identity Management Basics Derek Browne, CISSP, ISSAP Derek.Browne@Emergis.com May 9, 2007 Copyright The Foundation Permission is granted to copy, distribute and/or modify this document under the terms

More information

Identity Governance Evolution

Identity Governance Evolution Identity Governance Evolution Paola Marino Principal Sales Consultant Agenda Oracle Identity Governance Innovation Cloud Scenarios enabled by Oracle Identity Platform Agenda Oracle

More information

IBM WebSphere Cast Iron Cloud Integration

IBM WebSphere Cast Iron Cloud Integration IBM WebSphere Cast Iron Cloud Integration Andrew Daniel Katherine Sanders adaniel@uk.ibm.com katherine_sanders@uk.ibm.com Agenda Cast Iron Overview What's New Cast Iron Express with Demo What's New Additional

More information

Business Process Management with @enterprise

Business Process Management with @enterprise Business Process Management with @enterprise March 2014 Groiss Informatics GmbH 1 Introduction Process orientation enables modern organizations to focus on the valueadding core processes and increase

More information

SAP Identity Management Overview

SAP Identity Management Overview Identity Management Overview Public May 2016 Agenda Introduction to Identity Management Role Management and Workflows Business-Driven Identity Management Compliant Identity Management Reporting Password

More information

The Unique Alternative to the Big Four. Identity and Access Management

The Unique Alternative to the Big Four. Identity and Access Management The Unique Alternative to the Big Four Identity and Access Management Agenda Introductions Identity and Access Management (I&AM) Overview Benefits of I&AM I&AM Best Practices I&AM Market Place Closing

More information

The Circle of Life: Protecting Your Sun IAM Investment with ForgeRock s Open Identity Stack (formerly Sun Open Source IAM)

The Circle of Life: Protecting Your Sun IAM Investment with ForgeRock s Open Identity Stack (formerly Sun Open Source IAM) White Paper The Circle of Life: Protecting Your Sun IAM Investment with ForgeRock s Open Identity Stack (formerly Sun Open Source IAM) 1. Overview 2. Understanding the Options 3. Solving the Customer Problem

More information

Oracle Identity Manager, Oracle Internet Directory

Oracle Identity Manager, Oracle Internet Directory Oracle Identity Manager (OIM) is a user provisioning system. It defines properties for how users and groups get authorized to access compute and content resources across the enterprise. Identity Management

More information

Oracle Mobile Security Suite. René Klomp 6 mei 2014

Oracle Mobile Security Suite. René Klomp 6 mei 2014 Oracle Mobile Security Suite René Klomp 6 mei 2014 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be

More information

OracleAS Identity Management Solving Real World Problems

OracleAS Identity Management Solving Real World Problems OracleAS Identity Management Solving Real World Problems Web applications are great... Inexpensive development Rapid deployment Access from anywhere BUT. but they can be an administrative and usability

More information

Oracle Reference Architecture and Oracle Cloud

Oracle Reference Architecture and Oracle Cloud Oracle Reference Architecture and Oracle Cloud Anbu Krishnaswamy Anbarasu Enterprise Architect Social. Mobile. Complete. Global Enterprise Architecture Program Safe Harbor Statement The following is intended

More information

Oracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success

Oracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success Oracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success Manvendra Kumar AST Corporation, IL Scott Brinker College of American Pathologist, IL August

More information

SAP NetWeaver Identity Management

SAP NetWeaver Identity Management SAP NetWeaver Identity Management Technical Overview Presentation SAP AG Walldorf, April 2009 1 Disclaimer This presentation outlines our general product direction and should not be relied on in making

More information

Oracle Identity Analytics Architecture. An Oracle White Paper July 2010

Oracle Identity Analytics Architecture. An Oracle White Paper July 2010 Oracle Identity Analytics Architecture An Oracle White Paper July 2010 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may

More information

These requirements led to several challenges in deploying identity related applications within the enterprise:

These requirements led to several challenges in deploying identity related applications within the enterprise: 2 3 Directory services are key building blocks for secure identity-enabled business applications and the underlying enterprise identity management (IdM) architecture. Well-structured and organized directory

More information

Migration and Developer Productivity Solutions Retargeting IT for Emerging Business Needs

Migration and Developer Productivity Solutions Retargeting IT for Emerging Business Needs Migration and Developer Productivity Solutions Retargeting IT for Emerging Business Needs Charles Finley Transformix Computer Corporation Who We Are Transformix provides software solutions and services

More information

Apache Sentry. Prasad Mujumdar prasadm@apache.org prasadm@cloudera.com

Apache Sentry. Prasad Mujumdar prasadm@apache.org prasadm@cloudera.com Apache Sentry Prasad Mujumdar prasadm@apache.org prasadm@cloudera.com Agenda Various aspects of data security Apache Sentry for authorization Key concepts of Apache Sentry Sentry features Sentry architecture

More information

Security As A Service Leveraged by Apache Projects. Oliver Wulff, Talend

Security As A Service Leveraged by Apache Projects. Oliver Wulff, Talend Security As A Service Leveraged by Apache Projects Oliver Wulff, Talend Application Security Landscape 2 Solution Building blocks Apache CXF Fediz Single Sign On (WS-Federation) Attribute Based Access

More information

can I customize my identity management deployment without extensive coding and services?

can I customize my identity management deployment without extensive coding and services? SOLUTION BRIEF Connector Xpress and Policy Xpress Utilities in CA IdentityMinder can I customize my identity management deployment without extensive coding and services? agility made possible You can.

More information

Centralized Oracle Database Authentication and Authorization in a Directory

Centralized Oracle Database Authentication and Authorization in a Directory Centralized Oracle Database Authentication and Authorization in a Directory Paul Sullivan Paul.J.Sullivan@oracle.com Principal Security Consultant Kevin Moulton Kevin.moulton@oracle.com Senior Manager,

More information

SAP NetWeaver Identity

SAP NetWeaver Identity SAP NetWeaver SAP NetWeaver Identity Management: The Time Is Now Replace CUA Set a Strategic Course in User Administration CONTENT 4 Bring New Efficiency to Your User Administration 5 At Home in Every

More information

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003 Oracle Identity Management Concepts and Architecture An Oracle White Paper December 2003 Oracle Identity Management Concepts and Architecture Introduction... 3 Identity management... 3 What is Identity

More information

1 Introduction... 2 2 Product Description... 2 3 Strengths and Challenges... 4 4 Copyright... 5

1 Introduction... 2 2 Product Description... 2 3 Strengths and Challenges... 4 4 Copyright... 5 KuppingerCole Report EXECUTIVE VIEW by Martin Kuppinger April 2015 ITMC, a Danish vendor, delivers a comprehensive solution for Identity Provisioning and Access Governance with its IDM365 product. The

More information

IBM Rational Asset Manager

IBM Rational Asset Manager Providing business intelligence for your software assets IBM Rational Asset Manager Highlights A collaborative software development asset management solution, IBM Enabling effective asset management Rational

More information

Oracle Role Manager. An Oracle White Paper Updated June 2009

Oracle Role Manager. An Oracle White Paper Updated June 2009 Oracle Role Manager An Oracle White Paper Updated June 2009 Oracle Role Manager Introduction... 3 Key Benefits... 3 Features... 5 Enterprise Role Lifecycle Management... 5 Organization and Relationship

More information

Sisense. Product Highlights. www.sisense.com

Sisense. Product Highlights. www.sisense.com Sisense Product Highlights Introduction Sisense is a business intelligence solution that simplifies analytics for complex data by offering an end-to-end platform that lets users easily prepare and analyze

More information

Identity Management to support Hybrid Cloud environments at higher education institutions

Identity Management to support Hybrid Cloud environments at higher education institutions Identity Management to support Hybrid Cloud environments at higher education institutions Lessons learnt at the Technische Universität München and the Leibniz Supercomputing Centre EUNIS 2011 Silvia Knittl,

More information

Authentication As A Service. Why new Cloud based Authentication solutions will be adopted by about 50% of the companies by 2017?

Authentication As A Service. Why new Cloud based Authentication solutions will be adopted by about 50% of the companies by 2017? Authentication As A Service Why new Cloud based Authentication solutions will be adopted by about 50% of the companies by 2017? Jason Hart CISSP CISM VP Cloud Solutions What a great world Today's World

More information

Can I customize my identity management deployment without extensive coding and services?

Can I customize my identity management deployment without extensive coding and services? SOLUTION BRIEF CONNECTOR XPRESS AND POLICY XPRESS UTILITIES IN CA IDENTITY MANAGER Can I customize my identity management deployment without extensive coding and services? SOLUTION BRIEF CA DATABASE MANAGEMENT

More information

Trust but Verify: Best Practices for Monitoring Privileged Users

Trust but Verify: Best Practices for Monitoring Privileged Users Trust but Verify: Best Practices for Monitoring Privileged Users Olaf Stullich, Product Manager (olaf.stullich@oracle.com) Arun Theebaprakasam, Development Manager Chirag Andani, Vice President, Identity

More information

tibbr Now, the Information Finds You.

tibbr Now, the Information Finds You. tibbr Now, the Information Finds You. - tibbr Integration 1 tibbr Integration: Get More from Your Existing Enterprise Systems and Improve Business Process tibbr empowers IT to integrate the enterprise

More information

Key New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance

Key New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance Key New Capabilities Complete, Open, Integrated Oracle Analytics 11g: Intelligence and Governance Paola Marino Principal Sales Consultant, Management Agenda Drivers Oracle Analytics

More information

Documentation. CloudAnywhere. http://www.cloudiway.com. Page 1

Documentation. CloudAnywhere. http://www.cloudiway.com. Page 1 Documentation CloudAnywhere http://www.cloudiway.com Page 1 Table of Contents 1 INTRODUCTION 3 2 OVERVIEW 4 2.1 KEY FUNCTIONALITY 4 2.2 PREREQUISITES 5 3 FEATURES 6 3.1 A UNIVERSAL PROVISIONING SOLUTION.

More information

Active Directory Manager Pro 5.0.0.0 New Features

Active Directory Manager Pro 5.0.0.0 New Features Active Directory Manager Pro 5.0.0.0 New Features General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com

More information

EXECUTIVE VIEW. EmpowerID 2013. KuppingerCole Report. By Peter Cummings October 2013. By Peter Cummings pc@kuppingercole.

EXECUTIVE VIEW. EmpowerID 2013. KuppingerCole Report. By Peter Cummings October 2013. By Peter Cummings pc@kuppingercole. KuppingerCole Report EXECUTIVE VIEW By Peter Cummings October 2013 EmpowerID 2013 By Peter Cummings pc@kuppingercole.com October 2013 Content 1 Vendor Profile... 3 2 Product Description... 4 2.1 Single

More information

BOF4803 Open source identity and access management. 1 October 2012 5:30p San Francisco CA

BOF4803 Open source identity and access management. 1 October 2012 5:30p San Francisco CA Open source identity and access management 1 October 2012 5:30p San Francisco CA slide 2 Expert Panel Ludovic Poitou, ForgeRock Matt Hardin, Symas Pascal Jakobi, Thales Group Shawn McKinney, JoshuaTree

More information

Identity Access Management Challenges and Best Practices

Identity Access Management Challenges and Best Practices Identity Access Management Challenges and Best Practices Mr. Todd Rossin, Managing Director/Founder IDMWorks Special Thanks to JHU APL for providing the Parsons Auditorium for our use this evening 1 December

More information

100% NO CODING NO DEVELOPING IMMEDIATE BUSINESS -25% -70% UNLIMITED SCALABILITY DEVELOPMENT TIME SOFTWARE STABILITY

100% NO CODING NO DEVELOPING IMMEDIATE BUSINESS -25% -70% UNLIMITED SCALABILITY DEVELOPMENT TIME SOFTWARE STABILITY 100% UNLIMITED SCALABILITY TOTAL COST OF OWNERSHIP -25% +50% EFFICENCY INCREASE -70% +65% DEVELOPMENT TIME SOFTWARE STABILITY NO CODING NO DEVELOPING IMMEDIATE BUSINESS FlexyGo Rapid Application Builder

More information

<Insert Picture Here> Move to Oracle Database with Oracle SQL Developer Migrations

<Insert Picture Here> Move to Oracle Database with Oracle SQL Developer Migrations Move to Oracle Database with Oracle SQL Developer Migrations The following is intended to outline our general product direction. It is intended for information purposes only, and

More information

How to Get to Single Sign-On

How to Get to Single Sign-On How to Get to Single Sign-On Gregg Kreizman Neil Wynne Twitter: @neilwynne Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in

More information

Oracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004

Oracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004 Oracle Identity Management: Integration with Windows An Oracle White Paper December. 2004 Oracle Identity Management: Integration with Windows Introduction... 3 Goals for Windows Integration... 4 Directory

More information

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication

More information

Authentication Integration

Authentication Integration Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication

More information

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach IDENTITY MANAGEMENT AND WEB SECURITY A Customer s Pragmatic Approach AGENDA What is Identity Management (IDM) or Identity and Access Management (IAM)? Benefits of IDM IDM Best Practices Challenges to Implement

More information

Cross-domain Identity Management System for Cloud Environment

Cross-domain Identity Management System for Cloud Environment Cross-domain Identity Management System for Cloud Environment P R E S E N T E D B Y: N A Z I A A K H TA R A I S H A S A J I D M. S O H A I B FA R O O Q I T E A M L E A D : U M M E - H A B I B A T H E S

More information

Pro<DOC/> e-commerce Technology An Introduction

Pro<DOC/> e-commerce Technology An Introduction Pro e-commerce Technology An Introduction From Rightangle Technologies Private Limited (www.rigthangle.co.in) 1 P a g e R i g h t a n g l e T e c h n o l o g i e s P v t. L t d. 1 Problem Statement

More information

TG Web. Technical FAQ

TG Web. Technical FAQ TG Web Technical FAQ About this FAQ We encourage you to contact us if. You can't find the information you're looking for. You would like to discuss your specific testing requirements in more detail. You

More information

OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.

OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere. OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere. OpenAM, the only all-in-one open source access management solution, provides the

More information

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant Easy as 1-2-3: The Steps to XE Mark Hoye Services Portfolio Consultant September 25, 2015 Objective / Agenda Objective Provide relevant information about Banner XE Provide a framework for understanding

More information

Category: Business Process and Integration Solution for Small Business and the Enterprise

Category: Business Process and Integration Solution for Small Business and the Enterprise Home About us Contact us Careers Online Resources Site Map Products Demo Center Support Customers Resources News Download Article in PDF Version Download Diagrams in PDF Version Microsoft Partner Conference

More information

Authentication: Password Madness

Authentication: Password Madness Authentication: Password Madness MSIT 458: Information Security Group Presentation The Locals Password Resets United Airlines = 83,000 employees Over 13,000 password reset requests each month through the

More information

Professional Profile

Professional Profile Plex Plain GmbH Professional Profile Markus Tobler Current: 16.05.2013 Managerial Project Experience (excerpt, last three years) Responsibility Duration Team Budget and Delivery (full) Team Lead Budget

More information

ActiveRoles Server v 6.7

ActiveRoles Server v 6.7 ActiveRoles Server v 6.7 Slide Index Learning Objectives- Slide #3 Product Overview- Slides#4-9 Installation- Slides#16,17 Free Tools- Slides #18-22 Solutions-Slides #23,24 Role Delgation-Slides#25-30

More information

Gabriel Magariño. Software Engineer. gabriel.magarino@gmail.com. www.javapassion.com/idm. Overview Revisited

Gabriel Magariño. Software Engineer. gabriel.magarino@gmail.com. www.javapassion.com/idm. Overview Revisited Gabriel Magariño Software Engineer gabriel.magarino@gmail.com www.javapassion.com/idm Overview Revisited Disclaimer and Acknowledgments The contents here are created as a own personal endeavor and thus

More information

Oracle Audit Vault and Database Firewall. Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska

Oracle Audit Vault and Database Firewall. Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska Oracle Audit Vault and Database Firewall Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska The following is intended to outline our general product direction. It is intended for information

More information

Active Directory Implemenation

Active Directory Implemenation Active Directory Implemenation For PowerBuilder, Appeon Web & Appeon Mobile Powered by Sponsored by An Actual Implementation Case Study! By Chris Pollach President: Software Tool & Die Inc. Ottawa, Canada

More information

Government of Canada Directory Services Architecture. Presentation to the Architecture Framework Advisory Committee November 4, 2013

Government of Canada Directory Services Architecture. Presentation to the Architecture Framework Advisory Committee November 4, 2013 Government of Canada Directory Services Architecture Presentation to the Architecture Framework Advisory Committee November 4, 2013 1 Agenda TIME TOPICS PRESENTERS 9:00 9:15 Opening Remarks Objective for

More information

TEST AUTOMATION FRAMEWORK

TEST AUTOMATION FRAMEWORK TEST AUTOMATION FRAMEWORK Twister Topics Quick introduction Use cases High Level Description Benefits Next steps Twister How to get Twister is an open source test automation framework. The code, user guide

More information

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation RSA Via Lifecycle and Governance 101 Getting Started with a Solid Foundation Early Identity and Access Management Early IAM was all about Provisioning IT tools to solve an IT productivity problem Meet

More information

Three Campus Case Studies: Managing Access with Grouper

Three Campus Case Studies: Managing Access with Grouper Three Campus Case Studies: Managing Access with Grouper IAM Online March 13, 2013 Speakers: Paul Donahue and Keith Hazelton, University of Wisconsin-Madison Sébastien Gagné, University of Montreal Rahul

More information

Populating Your Domino Directory (Or ANY Domino Database) With Tivoli Directory Integrator. Marie Scott Thomas Duffbert Duff

Populating Your Domino Directory (Or ANY Domino Database) With Tivoli Directory Integrator. Marie Scott Thomas Duffbert Duff Populating Your Domino Directory (Or ANY Domino Database) With Tivoli Directory Integrator Marie Scott Thomas Duffbert Duff Agenda Introduction to TDI architecture/concepts Discuss TDI entitlement Examples

More information

Oracle Primavera Gateway

Oracle Primavera Gateway Oracle Primavera Gateway Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is

More information

Inside the Digital Commerce Engine. The architecture and deployment of the Elastic Path Digital Commerce Engine

Inside the Digital Commerce Engine. The architecture and deployment of the Elastic Path Digital Commerce Engine Inside the Digital Commerce Engine The architecture and deployment of the Elastic Path Digital Commerce Engine Contents Executive Summary... 3 Introduction... 4 What is the Digital Commerce Engine?...

More information

Novell Identity Manager

Novell Identity Manager AUTHORIZED DOCUMENTATION Overview Guide Novell Identity Manager 4.0.1 April 15, 2011 www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use

More information

Aspire Systems - Experience in Digital Marketing and Social Media

Aspire Systems - Experience in Digital Marketing and Social Media Case Study Aspire Systems - Experience in Digital Table of Contents 1. Digital agency s email marketing platform goes on-demand 2. Social media launch for a major apparel company 3. Mobile CRM empowerment

More information

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments Executive Overview... 3 Introduction...

More information

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved.

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. 1 Copyright 2011, Oracle and/or its affiliates. All rights ORACLE PRODUCT LOGO Session ID: 17202 Oracle Fusion Applications - Technology Essentials Overview Nadia Bendjedou Senior Director Product Strategy,

More information

Take Control of Identities & Data Loss. Vipul Kumra

Take Control of Identities & Data Loss. Vipul Kumra Take Control of Identities & Data Loss Vipul Kumra Security Risks - Results Whom you should fear the most when it comes to securing your environment? 4. 3. 2. 1. Hackers / script kiddies Insiders Ex-employees

More information

300+ APIs Everywhere

300+ APIs Everywhere 300+ APIs Everywhere API Management Microsoft Azure Monetize Transform Create Drive digital assets product to platform content channels internal agility API MANAGEMENT An API program is the foundation

More information

BONITA, The Open Source BPM Solution

BONITA, The Open Source BPM Solution BONITA, The Open Source BPM Solution «BPM, The Future is Now!»! Miguel Valdes Faura Bull R&D, BPM Manager Agenda Why BPM Matters? BPM Market Review Bonita in simple words Architecture Products and Components

More information

ActiveVOS Server Architecture. March 2009

ActiveVOS Server Architecture. March 2009 ActiveVOS Server Architecture March 2009 Topics ActiveVOS Server Architecture Core Engine, Managers, Expression Languages BPEL4People People Activity WS HT Human Tasks Other Services JMS, REST, POJO,...

More information

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Copyright 2012, Oracle and/or its affiliates. All rights reserved. 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Oracle Cloud Services Mike Lehmann Senior Director of Product Management WebLogic Server, Java Cloud Services, Coherence and Java EE

More information

Get Cloud Ready: Secure Access to Google Apps and Other SaaS Applications

Get Cloud Ready: Secure Access to Google Apps and Other SaaS Applications Get Cloud Ready: Secure Access to Google Apps and Other SaaS Applications Matt Weisberg Vice President & CIO, Weisberg Consulting, Inc. matt@weisberg.net Paul McKeith Technical Sales, Novell, Inc. pmckeith@novell.com

More information

White Paper: Intelligent BPM Architecture

White Paper: Intelligent BPM Architecture White Paper: Intelligent BPM Architecture White Paper Contents Authors: Eli Stutz, Head of Knowledge and Collaboration, PNMsoft. Tony Jetke, Enterprise Architecture Consultant and Account Manager, PNMsoft.

More information

PIE. Internal Structure

PIE. Internal Structure PIE Internal Structure PIE Composition PIE (Processware Integration Environment) is a set of programs for integration of heterogeneous applications. The final set depends on the purposes of a solution

More information

Server-side OSGi with Apache Sling. Felix Meschberger Day Management AG 124

Server-side OSGi with Apache Sling. Felix Meschberger Day Management AG 124 Server-side OSGi with Apache Sling Felix Meschberger Day Management AG 124 About Felix Meschberger > Senior Developer, Day Management AG > fmeschbe@day.com > http://blog.meschberger.ch > VP Apache Sling

More information

Red Hat Enterprise ipa

Red Hat Enterprise ipa Red Hat Enterprise ipa Introduction Red Hat Enterprise IPA enables your organization to comply with regulations, reduce risk, and become more efficient. Simply and centrally manage your Linux/Unix users

More information

HP OO 10.X - SiteScope Monitoring Templates

HP OO 10.X - SiteScope Monitoring Templates HP OO Community Guides HP OO 10.X - SiteScope Monitoring Templates As with any application continuous automated monitoring is key. Monitoring is important in order to quickly identify potential issues,

More information

Automated Data Ingestion. Bernhard Disselhoff Enterprise Sales Engineer

Automated Data Ingestion. Bernhard Disselhoff Enterprise Sales Engineer Automated Data Ingestion Bernhard Disselhoff Enterprise Sales Engineer Agenda Pentaho Overview Templated dynamic ETL workflows Pentaho Data Integration (PDI) Use Cases Pentaho Overview Overview What we

More information