Provisioning

Ontario Telemedicine Network (OTN) in Canada brings virtual care innovation to the healthcare system so that people can get the care they need when and where they need it most: at home, in their community, or in hospital. OTN needed to be able to quickly, simply, and securely on-board healthcare providers to programs and services…

+ read more

By: ssalgy
Jul 31, 2017
2:59 pm
Reads:
454
Score:
5

One of the nice things about the Cool Solutions site is that it allows various folk who have done neat things to share that information with everyone. Then they can add on a bit of functionality and so on, such that we end up with more than anyone on their own might develop. As an…

+ read more

geoffc
By: geoffc
Jul 25, 2017
12:04 pm
Reads:
387
Score:
5

Some time ago, I wrote a cool solution named “Read Resource Entitlement Values from User Application workflow”, presenting a way to handle multiple entitlement values from the user application, since NetIQ stuff does not allow to read it directly. We worked a lot with resources having multiple entitlement values. For this reason we wanted to…

+ read more

By: nsanson
Sep 28, 2016
3:39 pm
Reads:
1,181
Score:
5

With over 40,000 attendees, 500 exhibitors, and hundreds of sessions, this year’s RSA Security Conference was the place to be for anyone interested in keeping their networks, systems, and information safe from threats, including insider threats; which in turn got me thinking about least privilege. According to a survey done at the conference by Bromium,…

+ read more

rlapedis
By: rlapedis
Apr 21, 2016
12:40 pm
Reads:
5,621
Score:
5

IT contractors are like in-laws. They may not be blood relatives, but they’re still considered family. Similarly, contractors aren’t standard, permanent employees, but they still work within your organization, making them a part of the organizational family. Some in-laws are dignified and contribute positively to the family; some in-laws dreadful and make holidays a nightmare….

+ read more

Travis Greene
Apr 7, 2015
7:43 am
Reads:
2,987
Score:
Unrated

If you are going to call IDM via SOAP to create a new resource request, you should prepare a call like this one…

By: nsanson
Sep 3, 2014
11:45 am
Reads:
2,951
Score:
5

In today’s world, just managing identities isn’t enough for most organizations anymore. With increasing regulations both internally and externally, automated provisioning and deprovisioning is just the beginning of what any identity management solution should be doing for you today. Basically put– your identity management solution should also be the basis of your compliance and security…

+ read more

wheaps
By: wheaps
Nov 30, 2012
8:47 am
Reads:
2,947
Score:
Unrated

Managing user accounts manually in today’s fast-moving, government-regulated world is no longer sustainable. Gesellschaft für angewandte Versicherungs-Informatik mbH (GaVI), an IT service provider based in Mannheim, Germany, serving 30 German insurance companies, discovered this first hand, and it discovered an ideal solution. Christine Deger, who is head of Engineering Networks at GaVI, told us that…

+ read more

David Shephard
Mar 12, 2012
7:59 am
Reads:
6,838
Score:
Unrated

In his recent blog post, Mike Robinson pointed out that Traditional IT is too Slow and unresponsive for today’s consumers. These consumers increasingly demand immediate gratification, because the consumerization of IT is reshaping their expectations for procurement speed. Think about how easy it is to get an app on your phone: all you need to…

+ read more

jdebaer
By: jdebaer
Feb 10, 2012
10:36 am
Reads:
3,091
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow