On-Premises Identity and Access Management – Vendor + Product + Feature Matrix (2021)

Ben MarckCloud and Virtualization, Identity & Access Management, Offerings, Oracle, SAP, Technical TipsLeave a Comment

Finding the best Identity Management (IdM) products for your enterprise is not a trivial task. This is especially true when different products from different vendors that accomplish other objectives or services have remarkably similar (and therefore confusing) naming conventions. Not unlike other COTS enterprise suites, the ‘cloudification’ of these products has matured rapidly. To help layout the current Identity Management vendor/product landscape as we see it, we’ve put together the following matrix of products by vendors. Click Here to enlarge the table below. Identity management is challenging in today’s world, organizations must manage user identities across a wide range of … Read More

How to Register A Custom Scheduled Job or Plugin in Oracle Identity Manager (OIM)

Jimmy LutzIdentity & Access Management, Oracle, Technical TipsLeave a Comment

There are multiple scenarios where we may have to develop a custom scheduled job to perform tasks to meet client requirements. Once the expected job functionality is developed, below are the steps to register the expected job/plugin in OIM so that it can be used. Create the folder structure as follows.                 lib                 META-INF                 Plugin.xml The “lib” folder would have the jar file of the functionality that has been developed along with the dependent jar files. The “META-INF” folder should have the scheduledtask.xml file, which should hold the below content. The text displayed in RED … Read More

Smart Cards Speed Up Just-in-Time Provisioning

Jimmy LutzIdentity & Access Management, Offerings, Problem Solved, Technical TipsLeave a Comment

A large government organization hosts a common services platform for thousands of users. Their user provisioning process required manual intervention, which took time and was susceptible to error. With hundreds of thousands of users, this time and exposure to error added up. Our team optimized the user provisioning process by designing and implementing a just-in-time (JIT) provisioning solution. However, instead of relying on SSO and SAML assertions, our solution grabs the required information from the user’s two-factor authentication source, their smart card. In this way, users are automatically provisioned to the web applications as they attempt to access them, instead … Read More

Business Intelligence Hampered by a Lack of Clear Role Management

Jimmy LutzBig Data & BI, Business Strategy, Cloud and Virtualization, Higher Education, Identity & Access Management, Industry Trends, Problem SolvedLeave a Comment

A top 70 national university uses an enterprise-level solution to report on important university-wide research data and business intelligence. Access to this data is managed by roles across a multitude of schools within the university, but the lack of role management across the university was limiting access and use. To complicate things, the various stakeholders were initially reluctant to adopt a university-wide role framework or standard policy for provisioning and de-provisioning. In short: identity and access management (IAM) were inefficient and disjointed. Our team developed and implemented a phased approach to implement role-based access control (RBAC) framework to upgrade its … Read More

Thank you for joining the 2020 work-from-home experiment (whether you wanted to or not)

Brandon JonesBusiness Strategy, Cloud and Virtualization, Identity & Access Management, Industry Trends, OfferingsLeave a Comment

work from home experiment made easier with help from M&S Consulting

You already know the situation we’re in: we have all been plunged into the world’s largest work-from-home (WFH) experiment with very little time to adapt. This grand experiment has changed the rules for almost every working situation. Workers and companies that already had the ability for effective remote work are finding new challenges, now that seemingly everyone has joined the party. We have been refining the way our company works remotely since we began in 2002. Knowing how to get started, what’s important, and having the ability to reduce friction for your workforce will help you navigate through this time … Read More

Taking Advantage of Our Higher Education AWS Standard Plays (Begin Your Journey to the Cloud)

Brandon JonesBusiness Strategy, Cloud and Virtualization, Higher Education, Identity & Access Management, News and Updates, OfferingsLeave a Comment

M&S helps direct you on your journey to the cloud

Is your institution moving to the cloud? Are you adopting a cloud strategy, such as Cloud First, where the institution takes the plunge and jumps in with both feet, or perhaps an Opportunistic Cloud or Experimental Cloud strategy where they test the waters with select projects? Perhaps your institution has instead elected to stay out of the cloud entirely and to simply watch from a distance. Each of these strategies can be appropriate in the right context, but adopting a cloud strategy that works for your institution should be a priority. With any of these strategies, you need to ensure … Read More

On-Premises Identity & Access Management – Vendor + Product + Feature Matrix

Alex PingleyIdentity & Access Management, Industry Trends, News and Updates, Oracle, Technical Tips1 Comment

Security keyboard button

As with any packaged, on-premises suite, finding the best Identity Management products for your enterprise is a not a trivial task. This is especially true when different products from different vendors, that accomplish different objectives or services, have remarkably similar (and therefore confusing) naming conventions. To make matters worse, not unlike other COTS enterprise suites, the ‘cloudification’ of these products has begun and many vendors have started to offer a version of these products as a PaaS or SaaS offering. Additionally, many of these vendors also offer an IaaS type deployment of these packaged products in their on-prem form. M&S has … Read More

Identity & Access Management – Vendor & Product Matrix

Kyle FerncezBusiness Strategy, News and UpdatesLeave a Comment

As with any packaged suite, finding the best Identity Management products for your enterprise is a not a trivial task. This is especially true when different products from different vendors, that accomplish different objectives or services have remarkably similar (and therefore confusing) naming conventions. To help layout the current Identity Management vendor / product landscape as we see it, we’ve put together the following matrix of products by vendors. Service Identity Governance User Life Cycle, Self-Service, Request / Role Based, Provisioning & Deprovisioning, Password Management, Attestation & Compliance / Separation of Duties Oracle Identity Manager IBM® Security Identity Manager CA … Read More