It will also describe the motivation and the underlying principles of identity management. The book will explain not just the features and configuration options. It will also tell you why to do it in the first place. This book will tell you how to build and deploy a practical IDM solution. This is exactly what this book is all about: the right use of midPoint to build a practical Identity Management solutions. When it is used by the right hands, midPoint can do miracles. Whether it is given by our point of view, or whether that is the generic rule, we do not know for sure.Īll we know is that midPoint is a really useful tool. The IDM system was the core of vast majority of these solutions. We have seen a lot of IAM solutions during our careers. The term "Identity and Access Management" (IAM) was not even invented back then. There are few engineers in our team who have been dealing with identity management deployments since early 2000s. MidPoint Development, Maintenance and Support Troubleshooting Mappings and Expressions.Troubleshooting Clockwork and Projector.Organizational Structure Synchronization.Automatic Role Assignment in Object Template.Operational, Experimental and Deprecated Items.Synchronization Example: LDAP Account Correlation.Synchronization Situations and Reactions.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |