Category: Identity

Identity management tools: Key software for modern IAM

Identity and access management (IAM) is becoming increasingly important in today’s mobile-first, cloud-first world, and it’s crucial you choose the right identity management tools to meet the growing demands on your business. With new regulations and evolving cyber threats, an out of date IAM strategy and inadequate systems can put your business at risk. With… Read more…

FIM to MIM Migration: What You Need to Know

Forefront Identity Manager (FIM) will soon be out of support. What does that mean for organisations who rely on the system to manage users’ digital identities and credentials? Now that withdrawal of mainstream support has been announced, FIM to MIM migration has gone from being a recommended course of action to an essential one. Here’s… Read more…

How to Set Up and Run Rule Extension Unit Tests in MIM

After reading this blog, you will have the knowledge to be able to set up and run your own rule extension unit tests. This will help you develop solutions quicker, and do so to a higher quality. In the last blog in this identity management testing series, we looked at some of the issues with… Read more…

10 Questions to Ask Your IT Department about Mobility

Mobile is a critical or high priority for almost two thirds (64%) of organisations, according to IDG research. And why wouldn’t it be? Mobility not only enables increased productivity; it also opens the door to real business transformation. Specifically, the IDG research indicates that the most significant factors behind mobile investment are: Improving internal communication… Read more…

Meeting the demand for improved cyber security

Our cyber security journey started with strong identity and access management foundations. The world is changing, driven by the economics of cloud, the productivity of new collaboration technologies, and with the menace of cyber crime encroaching on our personal and working lives. As an organisation, we’ve had to evolve to meet the latest demands of… Read more…

New Microsoft Azure AD B2B Features Now in Preview

Microsoft recently announced new features for its Azure AD B2B Collaboration service. As explained in my earlier blog post, ‘How to Manage Partner Identities Better With Azure AD B2B’, this service offers a secure and hassle-free way of authenticating your partner identities so that they can collaborate with you. Authentication is based on corporate identities being… Read more…

Why linking HR and IT is crucial to identity management

When it comes to provisioning and deprovisioning user accounts, IT departments often don’t know who’s who in the organisation, or who should have access to what. They rely on being fed data by human resources (HR), the custodians of employee data. But how is this managed? How can users be managed in different environments based… Read more…

How to manage partner identities better with Azure AD B2B

It’s one thing having to manage the identities of users in your organisation’s directory; how tricky must it be to add users from your partners into the mix? The task is perhaps not as great as you’d expect, thanks to Azure AD B2B. Working out the best way to interact with partners, particularly where large numbers… Read more…

Identity: the new security perimeter?

Headlines and industry publications are full of dire warnings about the latest phishing scam or malevolent machinations by cybercriminals. So naturally CISOs focus on their network perimeter in an effort to prevent such exploits. And often they fail. Why? Because no one can control criminal exploits. And with the advent of enterprise mobility and the… Read more…

MIM Sync Engine Debugging: Should You Bother?

So far in the series, we’ve looked at why we test and how we do it. The next logical step might be a blog on how to debug your code in Sync Engine, but – since this article on MSDN covers that well enough, and since there are plenty of other blogs out there on… Read more…