Frustrated with writing back new username and email to SAP HR? You’re not alone. Most joiner processes for new hires generate an username and email address dynamically, but a problem can arise when using SAP HR systems because there is no direct way to write back the newly generated username and email to SAP HR […]
[vc_row][vc_column][vc_column_text] Microsoft recently announced Azure DevOps, a collection of services for software development teams. The individual services are quite extensible and have a generous free tier for small teams. Specifically, the Azure Pipelines service is intriguing, offering a full-featured continuous integration / continuous deployment platform with 1,800 free build minutes per month. In a previous […]
What Is Unsolicited Login? Unsolicited login is the functionality where users access some part or feature of an application anonymously, but another part or feature requires them to login/authenticate before using those features. An Unsolicited Login Scenario For OAM Let’s assume that there’s an application ABC which we access using www.abc.com. By default, any user […]
[vc_row][vc_column][vc_column_text] Bitbucket’s Pipelines feature allows you to configure continuous integration and continuous deployment (CI/CD) directly within Bitbucket, without an external CI/CD server such as Jenkins. In this article, we’ll walk through configuring Bitbucket Pipelines to deploy AWS Lambda functions automatically. We’ll create a new AWS Lambda function, create a new Bitbucket repository to hold our […]
[vc_row][vc_column][vc_column_text]One of the many exciting features of the Hitachi ID Identity and Access Management (IAM) Suite is the web services API which is accessible using SOAP over HTTPS with a WSDL specification. This API allows other enterprise applications to access workflow request queue, user data and resources that exist within an instance of the Hitachi […]
Have you ever ran into a situation where you think everything is in place and ready to go only to run into an unexpected error? Sure you have, we all have. And the other day was no different for me. After performing an install and configuration of SSPR 3.3 in a new environment, I thought […]
We’ve put together a short list of some best practices for unique login names. Users having a unique name is important for auditing and security. Define a method early on to help assure users are always unique across all systems and helps pinpoint any security and audit concerns quickly. Avoid recognizable naming standards. Such as […]
Now that the holiday season has drawn to a close, the focus of the New Year turns to accelerating growth for many companies. And this often means new hires to support new business. Previously, I talked about how the holidays can be a real struggle for end users and support techs because of passwords. People […]
For those of you responsible somehow for the security of your company’s network and information stores, your job never ends. You are placed between two points of diminishing returns between authentic users and the rest of the world: hackers, competitors, prior employees, and list goes on. I compare your job to one I previously had […]
Depending on your role within an Identity & Access Management shop, successes are defined by various proverbial champagne-popping accomplishments. If your role is that of a Software Engineer, you and your colleagues give each other a pat on the back and an “atta-go!” on the day the major release of the product you’ve been working […]