Explore Insights

Dive deep into cybersecurity’s hottest trends. Explore the latest insights on global and business challenges, breakthroughs, and emerging technologies in identity management. Find vendor training events, and get technical tips on integration and coding.

Sort Results

Showing 121 - 126 of 239 results
blog icon

Blog

Enabling Incremental Reconciliation from Trusted Source IDCS to Oracle Identity Governance

Oracle Identity Governance (OIG) 12c uses connectors to reconcile user data from trusted source applications like Oracle Identity Cloud Service (IDCS). By default, OIG will perform a full reconciliation and sync all users from the source application.

May 25, 2023

blog icon

Blog

Sequential Flow of Events in Oracle Identity Governance 12c User Reconciliation

High level flow of how user data flows from trusted into OIM/OIG when the trusted application is onboarded into OIM through new AoB/Application Onboarding approach feature.

May 22, 2023

blog icon

Blog

Enabling Incremental Reconciliation from Azure AD to OIM: Step-by-Step Guide

A complete guide on how to enable the incremental reconciliation from Azure Active Directory AD which is trusted application into Oracle Identity Manager OIM.

May 15, 2023

blog icon

Blog

Fixing the Delete User/Delete Account Issue for OIG 12c PS4 - IDCS Connector: Step-by-Step Guide

Organizations today rely heavily on identity and access management solutions to ensure secure access to their resources. Oracle Identity Governance (OIG) is one such solution that provides a comprehensive approach to managing access and enforcing policies for enterprise resources.

May 8, 2023

blog icon

Blog

Managed Connectivity Approach to Integrating Applications

The last mile is a term used to describe the last stretch of road between the provider of services and the customer. This is the most difficult because there are a myriad of unknown obstacles and difficulties that exist nearest the desired destinations. The same is true for IGA products, there are easy wins, but quickly organizations realize the complexity and the difficulty of getting to the last mile.

April 22, 2023

blog icon

Blog

Cyberark and Ping Identity Security for the Entire Organization

In today's digital world, cybersecurity is more important than ever. We’re constantly seeing headlines where organizations have reported hackers accessing the password directories and gaining access to critical customer data.

April 19, 2023