Finding the best Identity Management (IdM) products for your enterprise is not a trivial task. This is especially true when different products from different vendors that accomplish other objectives or services have remarkably similar (and therefore confusing) naming conventions. Not unlike other COTS enterprise suites, the ‘cloudification’ of these products has matured rapidly. To help layout the current Identity Management vendor/product landscape as we see it, we’ve put together the following matrix of products by vendors. Click Here to enlarge the table below. Identity management is challenging in today’s world, organizations must manage user identities across a wide range of … Read More
How to Register A Custom Scheduled Job or Plugin in Oracle Identity Manager (OIM)
There are multiple scenarios where we may have to develop a custom scheduled job to perform tasks to meet client requirements. Once the expected job functionality is developed, below are the steps to register the expected job/plugin in OIM so that it can be used. Create the folder structure as follows. lib META-INF Plugin.xml The “lib” folder would have the jar file of the functionality that has been developed along with the dependent jar files. The “META-INF” folder should have the scheduledtask.xml file, which should hold the below content. The text displayed in RED … Read More
Smart Cards Speed Up Just-in-Time Provisioning
A large government organization hosts a common services platform for thousands of users. Their user provisioning process required manual intervention, which took time and was susceptible to error. With hundreds of thousands of users, this time and exposure to error added up. Our team optimized the user provisioning process by designing and implementing a just-in-time (JIT) provisioning solution. However, instead of relying on SSO and SAML assertions, our solution grabs the required information from the user’s two-factor authentication source, their smart card. In this way, users are automatically provisioned to the web applications as they attempt to access them, instead … Read More
Business Intelligence Hampered by a Lack of Clear Role Management
A top 70 national university uses an enterprise-level solution to report on important university-wide research data and business intelligence. Access to this data is managed by roles across a multitude of schools within the university, but the lack of role management across the university was limiting access and use. To complicate things, the various stakeholders were initially reluctant to adopt a university-wide role framework or standard policy for provisioning and de-provisioning. In short: identity and access management (IAM) were inefficient and disjointed. Our team developed and implemented a phased approach to implement role-based access control (RBAC) framework to upgrade its … Read More
Thank you for joining the 2020 work-from-home experiment (whether you wanted to or not)
You already know the situation we’re in: we have all been plunged into the world’s largest work-from-home (WFH) experiment with very little time to adapt. This grand experiment has changed the rules for almost every working situation. Workers and companies that already had the ability for effective remote work are finding new challenges, now that seemingly everyone has joined the party. We have been refining the way our company works remotely since we began in 2002. Knowing how to get started, what’s important, and having the ability to reduce friction for your workforce will help you navigate through this time … Read More
Taking Advantage of Our Higher Education AWS Standard Plays (Begin Your Journey to the Cloud)
Is your institution moving to the cloud? Are you adopting a cloud strategy, such as Cloud First, where the institution takes the plunge and jumps in with both feet, or perhaps an Opportunistic Cloud or Experimental Cloud strategy where they test the waters with select projects? Perhaps your institution has instead elected to stay out of the cloud entirely and to simply watch from a distance. Each of these strategies can be appropriate in the right context, but adopting a cloud strategy that works for your institution should be a priority. With any of these strategies, you need to ensure … Read More
On-Premises Identity & Access Management – Vendor + Product + Feature Matrix
As with any packaged, on-premises suite, finding the best Identity Management products for your enterprise is a not a trivial task. This is especially true when different products from different vendors, that accomplish different objectives or services, have remarkably similar (and therefore confusing) naming conventions. To make matters worse, not unlike other COTS enterprise suites, the ‘cloudification’ of these products has begun and many vendors have started to offer a version of these products as a PaaS or SaaS offering. Additionally, many of these vendors also offer an IaaS type deployment of these packaged products in their on-prem form. M&S has … Read More
Identity & Access Management – Vendor & Product Matrix
As with any packaged suite, finding the best Identity Management products for your enterprise is a not a trivial task. This is especially true when different products from different vendors, that accomplish different objectives or services have remarkably similar (and therefore confusing) naming conventions. To help layout the current Identity Management vendor / product landscape as we see it, we’ve put together the following matrix of products by vendors. Service Identity Governance User Life Cycle, Self-Service, Request / Role Based, Provisioning & Deprovisioning, Password Management, Attestation & Compliance / Separation of Duties Oracle Identity Manager IBM® Security Identity Manager CA … Read More