IAM Blog

Bitbucket Pipelines accelerate .NET Builds

Bitbucket Pipelines: Custom Docker Image with Amazon Elastic Container Service

Introduction Bitbucket Pipelines is an excellent CI/CD tool that allows users of Bitbucket to automate the Continuous Integration and Continuous Delivery of their software, including: Building code Running automated tests Auditing code for vulnerabilities Performing static code analysis Packaging code artifacts Publishing code Deploying code Challenge One of the challenges developers may face after adopting […]
Read More
Healthcare protected privileged passwords PAM

Four Ways to Protect Passwords Like They’re Privileged Credentials

The healthcare industry handles some of the most sensitive data and passwords, including patients’ personal health information. As a result, healthcare organizations are highly regulated and must implement strict security controls to protect customers’ privacy. Despite these measures, healthcare data breaches frequently make news headlines, often resulting in reporting to regulatory bodies and the customers […]
Read More
Oracle Cloud hovering above a laptop

Enabling Incremental Reconciliation from Trusted Source IDCS to Oracle Identity Governance

Oracle Identity Governance (OIG) 12c uses connectors to reconcile user data from trusted source applications like Oracle Identity Cloud Service (IDCS). By default, OIG will perform a full reconciliation and sync all users from the source application. What is Incremental Reconciliation? The incremental reconciliation is a concept in IDM demography were during the reconciliation of […]
Read More
Laptop showing user data reconciliation

Sequential Flow of Events in Oracle Identity Governance 12c User Reconciliation

High level flow of how user data flows from trusted into OIM/OIG when the trusted application is onboarded into OIM through new AoB/Application Onboarding approach feature. In this article, you will learn the sequence of events, data flows, and custom code/out-of-the-box components executed during user reconciliation in chronological order. Understanding this sequence will help you […]
Read More
Cyberark and Ping Identity integration

Cyberark and Ping Identity Security for the Entire Organization

Ping Identity and Cyberark have partnered to provide Single Sign-on and privilege access management to manage Enterprise critical assets such as password management and secrets. In today’s digital world, cybersecurity is more important than ever. We’re constantly seeing headlines where organizations have reported hackers accessing the password directories and gaining access to critical customer data. […]
Read More