Category: <span>solutions</span>

Identity Governance with MicroFocus – Getting Started, Points to Consider

Introduction Gartner Research defines identity governance and administration (IGA) as a means to “manage digital identity and access rights across multiple systems and applications.” While this seems straightforward, most enterprises have a massive and complex digital environment. IGA is necessary to manage and control user access across the entire organization, regardless of where and from
Read More

Auditing IT Administrators with Privileged Access Management

Identifying and understand privileged identities within your organization is a daunting task. Managing, auditing and keeping the privileged account inventory up-to-date is even more challenging depending on the size and complexity of your IT footprint. Privileged accounts should be audited on a regular basis and organizations should understand what types of privileged access are being
Read More

Oracle Identity Management / Governance (OIM/OIG) 12c Installation and Configuration

This post will walk through the installation process for Oracle Identity Manager/Oracle Identity Governance 12c (12.2.1.3.0), and its supporting infrastructure, in a *nix environment. This post will NOT cover installation via the Oracle Quick Installer. We’ll be installing and configuring FMW Infrastructure, SOA, and OIM using their separate installers. I will also point out some
Read More

Single Oracle Connector Server Provisioning to Multiple Active Directory Domains

We’ve encountered an issue when clients have multiple active directory domains and the IDM needs to provision into multiple AD Domains (and domains are in separate forest.) Oracle’s active directory connector documentation states that the connector server should be on the same domain that you intend to provision into. So, for multiple AD Domains, a
Read More

Unix & Privileged Access Management (PIM or PAM)

As the number of cyber-attacks increase, the need for organizations to increase their security posture has become more evident. Securing and managing privileged accounts by implementing a robust Privileged Identity & Access Management (PIM or PAM) must be a high priority. Privileged Users Privileged Users are identities that have the capability of performing administrative functions,
Read More