A new way to think about IGA application connectivity and how to tackle the last mile. The last mile is a term used to describe the last stretch of road between the provider of services and the customer. This is the most difficult because there are a myriad of unknown obstacles and difficulties that exist […]
What does the future hold for on-premises Microsoft Active Directory services? During a recent discussion with a client, we explored the direction of on-premises directory services and thought it would be worth sharing. Microsoft continues to thrive with their hybrid strategy, which allows for the coexistence of Active Directory with Azure Active Directory to provide […]
If You Still Think Active Directory Should Be Your Authoritative Source for User Identities, Then We Need to Talk… Active Directory has been around for a long time. How long? It was released last century. The World Trade Center was standing tall, Bill Clinton was president, and many of us had friends who were prepping […]
Today’s cybersecurity environment requires the layering of control processes and technology tools when building or updating an Identity Access Management (IAM) program. Core program components include Identity Governance and Administration (IGA), Single Sign-on (SSO), Multi-factor Authentication (MFA), and Privileged Access Management (PAM) tools to help companies strengthen their security posture and realize greater operational efficiencies […]
Market-First Solution Allows Users to Measure and Monitor the Health of Their Full Identity Security Program, Providing a Unified View Across All Vendor Solutions. February 9, 2022 Miami, FL — IDMWORKS, consistently referenced by Gartner and Forrester as a top Identity and Access Management consultancy, today announced its market-first IAM Insights Dashboard to deliver real-time […]
IDMWORKS Launches Lifecycle Auto Fulfillment to Enable Auto Access Provisioning to Every Application February 3, 2022 Miami, FL — IDMWORKS, consistently referenced by Gartner and Forrester as a top Identity and Access Management consultancy, today announced a unique solution that finally delivers automated, rapid access provisioning for the multitude of applications that are not currently […]
Occasionally we run across a situation where there is a large load on an LDAP server. When this happens, it’s possible that the LDAP server would not able to adequately log events. This makes it difficult, if not impossible, to narrow down the details of what is happening with the LDAP operations. This document’s steps […]
In this post we’ll look at implementing the Request-response pattern using Spring Cloud Stream and Netty. What is the Request-Response Pattern? From the Wikipedia page for Request-response: “Request–response is a message exchange pattern in which a requestor sends a request message to a replier system which receives and processes the request, ultimately returning a message […]
Setting up logging is one of the first things to configure when setting up a SailPoint IdentityIQ environment for the first time. Although there isn’t any set standard I have seen in setting up logging, there are a few simple steps I usually take to make life easier when trying to look through the logs. […]
SailPoint IdentityIQ offers instructions on their standard work processes and how to create custom work processes, but doesn’t broadly expound on how to troubleshoot work processes when they are not working as expected. The Trace feature can be useful to help with troubleshooting. Trace There is a variable called “trace” in the standard, out-of-the-box SailPoint […]