Building the Next Generation of IAM Leaders

At a time when it’s easy to get caught up in the chaos of Q4, planning for a successful 2020, and juggling holiday craziness, it’s easy to feel like we are running in circles and to lose sight of the bigger picture. This week a few of us at IDMWORKS had a unique opportunity to
Read More

Centralized Authentication in Linux, SSSD, and a Simple(r) Approach to sudoer management in Linux: Part 3

In part 1 of this blog series, we talked about centralized authentication in Linux and covered some basic use cases. Part 2 discussed System Security Services Daemon (SSSD) and why it’s becoming so important to centralized authentication in the Linux space.  In part 3, our final post in the series, we’ll discuss authorization and different
Read More

Identity Governance with MicroFocus – Getting Started, Points to Consider

Introduction Gartner Research defines identity governance and administration (IGA) as a means to “manage digital identity and access rights across multiple systems and applications.” While this seems straightforward, most enterprises have a massive and complex digital environment. IGA is necessary to manage and control user access across the entire organization, regardless of where and from
Read More

Centralized Authentication in Linux, SSSD, and a Simple(r) Approach to sudoer management in Linux: Part 2

In part 1 of this blog series, we talked about centralized authentication in Linux and covered some basic use cases. In today’s post, we want to talk about System Security Services Daemon (SSSD) and why it’s becoming so important to centralized authentication in the Linux space. But first, we will touch upon Pluggable Authentication Module
Read More

IIQDA 4.0 Plugin Installation with Full Features

While the IIQDA Plugin is a great tool to help your developers accelerate their development efforts, installation isn’t always straightforward. We’ve worked through challenges with many customers who’ve faced issues when installing and using the IIQDA4.0.2 plugin. One of the biggest challenges is that installation tips/guides seem to be either incomplete or scattered across multiple
Read More

Centralized Authentication in Linux, SSSD, and a Simple(r) Approach to sudoer management in Linux: Part 1

Linux is, without a doubt, one of the most used server operating systems in the world. It is flexible, powerful, and many times the solutions derived from Linux-based applications are as good as their commercial, and proprietary, counterparts. Linux does have challenges that start from the very moment a user of the host attempts to
Read More

Storing Multiple Values in a Single Value in NetIQ Identity Manager

Recently we encountered an organization that had deployed a rather ingenious solution to a seemingly complex problem within their NetIQ IDM solution. The organization is a large University with over a dozen campuses. Across this broad array of campuses, an individual can have multiple roles as both student and/or staff member at multiple campuses concurrently.
Read More

Managing Non-Employee Identities in Healthcare

It’s not just malicious cyber-attacks or criminal activity that companies need to prepare for. The majority of data breaches originate within companies due to human error or negligence, and in many cases, this can be traced back to the lack of proper access controls. One of the biggest access challenges? Securely and efficiently managing non-employee
Read More