Category: <span>technology</span>

Request-Response Pattern With Spring Cloud Stream

In this post we’ll look at implementing the Request-response pattern using Spring Cloud Stream and Netty. What is the Request-Response Pattern? From the Wikipedia page for Request-response: “Request–response is a message exchange pattern in which a requestor sends a request message to a replier system which receives and processes the request, ultimately returning a message
Read More

Blockchain & Identity – How can Identities be Stored and Used on Blockchains?

When called upon to improve our customers’ Identity Management systems, or to build new systems from the ground up, we often look at the customers’ business requirements and attempt to fit them into the currently available management systems and services, based around centralized authorities like directory services and databases. We work our way down with
Read More

Blockchain & Identity

As a leader in the Identity and Access Management space, IDMWORKS always tries to stay on top of new advancements in technology as it relates to our areas of expertise. And there’s no denying that Blockchain is one of the most talked about and potentially impactful tech inventions to permeate almost all areas of technology
Read More

Boundaries, Geolocation and a Flaw

A recent implementation project of SailPoint’s IdentityNow cloud-based SSO product demonstrated some key conceptual challenges when moving from an on-premises based Single Sign On solution to a cloud-based solution. Many organizations are migrating their applications to the cloud. They are moving to Office 365, cloud-based CRM solutions, cloud-based document management and storage, cloud-based HR solutions,
Read More

Golden SAML: A Tool, Not An Attack

A blog article has been circulating in the press with claims of new attack technique that allows forging of identities to cloud applications, dubbed “Golden SAML”: Golden SAML: Newly Discovered Attack Technique Forges Authentication to Cloud Apps. The author Shaked Reiner’s choice of the word “attack” is unfortunate, as the distinction between attacks, exploits, vulnerabilities,
Read More

Best Practices for Logging

Setting up logging is one of the first things to configure when setting up a SailPoint IdentityIQ environment for the first time. Although there isn’t any set standard I have seen in setting up logging, there are a few simple steps I usually take to make life easier when trying to look through the logs.
Read More

Securing And Managing LDAP In Your Environment

How secure and well managed are your LDAP services? Ever considered using a LDAP Proxy? Shouldn’t my dumb VIP be sufficient for load balancing? In my past 18 years working with LDAP I have seen many neglected systems. I have seen systems that allow anonymous authentication, clear text over port 389, accessible scripts with user authentication information,
Read More

IDMWORKS Presentations @ CIS

Come visit IDMWORKS booth 130 at the Cloud Identity Summit in Chicago and join us when we present on the following topics tomorrow, Wednesday, June 21: 9:30 AM – 9:55 AM | Developing Efficient Access For Health Care Providers Location: Sheraton Ballroom III Presented By: Chris Schmidt, Manager Information Systems, Greenville Health System Terry Jolly
Read More