In the first part of our series, we discussed important features the company’s certificate authority should have. In today’s post, we will present the CAW, our execution engine. Read on.
Task scheduler is a tool in CzechIdM which manages long running operations. One can plan to run tasks automatically in scheduled terms or start them manually. They e.g. manage personnel processes like End of contract or Enabled contract. Moreover, password expiration, automatic roles assigning and other task are also managed by task scheduler. In current version of CzechIdM you are not only able to find list of tasks and their detail, but every detail now show the history of processed object (e.g. identities). But that is not at all, new version of task scheduler brings the feature of Dry run! Read on. Continue reading
Everyone knows that an identity manager automatically handles access rights of users in connected systems. But how does it do that? CzechIdM 7 comes with a set of default processes that do the job. What are they about you will find out in the article.
Many companies use an on-premise certificate authority (CA) for their internal purposes. Without a doubt, one specific function of the certificate authority in a company is handling users’ certificates. Those certificates are bound to physical persons and as such, they fit neatly into the identity management problematics.
For this reason, CzechIdM implements the CA functionality in the form of a module. In this short series of posts, we will describe basic workings of our CA implementation and how it can be fit into the company’s infrastructure.
In MS Active Directory, groups can have members not only from the same domain but also from other trusted domains. This is determined by “type” of a group. Such cross domain group membership can be now managed by CzechIdM.
You installed CzechIdM and then connected systems to it. You prepared provisioning and synchronization definitions with attributes mapping. Well done, now you can automatically distribute information about identities, roles and other object between connected systems. But what to do, if there is some attribute value transformation required? You will find you in the following text.
Reg module servers as a registration point for new users to access CzechIdM. To be a registered user, one has to go through several validation steps before he can log in to CzechIdM. In the article we will describe, how the reg module can save administrator’s time. Continue reading
We are glad you are using our product. Sometimes it happens, that you find some functionality that may not work correctly. Or you need some new features to be added to CORE, ACC or IC module. In this article we will show you, how to report the bug or the feature request.
New version of CzechIdM brings new approach to the application configuration. We can use easy static configuration or define configuration properties in the application itself and do some advanced magic. In the article we will go through the application configuration and show the reader how easily activate installed modules. Continue reading