Identity and Governance
IF001 for IGI 5.2.5.1 now available
On July 19, 2019 we made IF001 on top of IGI 5.2.5.1 publicly available on FixCentral. This iFix include some strong performance improvements especially within the Access Certification module. Improvements are made in the following areas: a. Time to launch Campaign Summary Page (Especially in the event of a high number of campaigns). This improves by […]
Modernizing your B2C Portal Security – LDAP Proxy Deep Dive
In this part of our series we are taking a deeper look on how the LDAP reverse proxy works and what is needed to be done to make it work. Enable CI In this part we look at what needs to be done on the CI side and what information needs to be collected. We […]
IF001 for IGI 5.2.5.1 now available
On July 19, 2019 we made IF001 on top of IGI 5.2.5.1 publicly available on FixCentral. This iFix include some strong performance improvements especially within the Access Certification module. Improvements are made in the following areas: a. Time to launch Campaign Summary Page (Especially in the event of a high number of campaigns). This improves by […]
Modernizing your B2C Portal Security – Desired End State
Proposition: As we have seen in part one of this series, managing customer identities for a portal can be a challenge and distraction for the business. In this part of the series we will outline how a modernized solution for a portal security can simplify operations and free your team up to focus on the […]
Modernizing your B2C Portal Security – Introduction and Challenges
Introduction: Business to Consumer (B2C) is an incredibly common kind of identity and access management implementation. This implementation allows consumers to self-register and self-manage their digital identities for a given retailer or service provider. The provider does this so that they can streamline subsequent interactions with consumers and to provide a seamless user experience while […]
IGDM Part 3 – Implementing the Identity Governance Data Model
This blog is the third in a series of three looking at a proposed common Identity Governance Data Model (IGDM). This model attempts to address the needs of managing heterogeneous complex target system access models in an Identity Governance and Administration (IGA) environment. The proposed IGDM is designed to standardize identity management and governance data […]
IGDM Part 2 – Validating the Proposed Identity Governance Data Model
This blog is the second in a series of three looking at a proposed common Identity Governance Data Model (IGDM). This model attempts to address the needs of managing heterogeneous complex target system access models in an Identity Governance and Administration (IGA) environment. The proposed IGDM is designed to standardize identity management and governance data […]
IGDM Part 1 – Proposing an Identity Governance Data Model
This blog is the first in a series of three looking at a proposed common Identity Governance Data Model (IGDM). This model attempts to address the needs of managing heterogeneous complex target system access models in an Identity Governance and Administration (IGA) environment. The proposed IGDM is designed to standardize identity management and governance data […]
Identity Governance and Intelligence – Custom Rules
Identity Governance and Intelligence – Custom Rules IBM Security Identity Governance and Intelligence (IGI) allows enterprises to manage and govern users, such as to provision, audit and report user access and his activities through life cycle, compliance and analytics capabilities. This blog presents a new resource to assist with extending the functionality of IGI, namely […]
Two-way SSL database configurations with IBM® Security Identity Governance and Intelligence Virtual Appliance (IGI-VA)
Two-way SSL database configurations with IBM® Security Identity Governance and Intelligence Virtual Appliance (IGI-VA) About one-way SSL and two-way SSL authentication Configuring communication between an SSL server and client can use one-way or two-way SSL authentication. The SSL client is the computer where the IBM Security Identity Governance and Intelligence Server (IGI) is installed, and […]
Log forwarder configuration in IBM® Security Identity Governance and Intelligence Virtual Appliance (IGI-VA)
Log forwarder configuration in IBM® Security Identity Governance and Intelligence Virtual Appliance (IGI-VA) Introduction Starting from IGI V5.2.4, virtual appliance (VA) has provided a feature to forward all the logs in VA to the centralized log management server. Internally, VA uses “filebeat” as an agent to forward all the VA logs. A user can configure […]
BOT Governance
Identity Governance and Intelligence to govern Bots Identity Governance and Intelligence (IGI) allows enterprises to provision, audit and report user access and his activities through life cycle, compliance and analytics capabilities. While IGI revolves around typical entities like Users, Entitlements, Accounts, Groups, Roles etc., we are now introducing the notion of a Bot as an […]