Identity-Access-Management-Concepts

Deploy Automatically to AWS Lambda via Azure Pipelines

[vc_row][vc_column][vc_column_text] Microsoft recently announced Azure DevOps, a collection of services for software development teams. The individual services are quite extensible and have a generous free tier for small teams. Specifically, the Azure Pipelines service is intriguing, offering a full-featured continuous integration / continuous deployment platform with 1,800 free build minutes per month. In a previous […]
Read More
Unsolicited Login IAM Image

Enabling unsolicited login in OAM 11gR2

What Is Unsolicited Login? Unsolicited login is the functionality where users access some part or feature of an application anonymously, but another part or feature requires them to login/authenticate before using those features. An Unsolicited Login Scenario For OAM Let’s assume that there’s an application ABC which we access using www.abc.com. By default, any user […]
Read More

Deploy Automatically to AWS Lambda via Bitbucket Pipelines

[vc_row][vc_column][vc_column_text] Bitbucket’s Pipelines feature allows you to configure continuous integration and continuous deployment (CI/CD) directly within Bitbucket, without an external CI/CD server such as Jenkins. In this article, we’ll walk through configuring Bitbucket Pipelines to deploy AWS Lambda functions automatically. We’ll create a new AWS Lambda function, create a new Bitbucket repository to hold our […]
Read More
Soap Web Services API Calling The Login Function Using Python IAM Image

Hitachi ID SOAP Web Services API – Calling The Login Function Using Python

[vc_row][vc_column][vc_column_text]One of the many exciting features of the Hitachi ID Identity and Access Management (IAM) Suite is the web services API which is accessible using SOAP over HTTPS with a WSDL specification. This API allows other enterprise applications to access workflow request queue, user data and resources that exist within an instance of the Hitachi […]
Read More

IDM & the Holidays: Part III

Now that the holiday season has drawn to a close, the focus of the New Year turns to accelerating growth for many companies. And this often means new hires to support new business. Previously, I talked about how the holidays can be a real struggle for end users and support techs because of passwords. People […]
Read More