Virtual systems is one of main section in CzechIdM. In CzechIdM you can have many connected systems. But not for all systems is necessary to be connected directly. For example system with a few users can be connected as virtual system, because connection to system like that will not be used that many times like on other systems, so you can save time and connect these systems like virtual systems.
Virtual system is not directly connected to CzechIdM and all changes have to be made manually by administrator. CzechIdM sends to administrator notification with precise information about create, update or delete account on virtually connected system. Administrator can see which lines has been changed and what was there before change and what will be there after change. And all these tasks are stored in ‘Archive’.
Workflow is a magic word almost like MAC, both has several meanings. Which meaning is the right one in case of workflow? What does it represent in the identity management context, you will find out in the article.
Three weeks after the Diamond was released, here comes a new stable version of CzechIdM called Emerald. It provides many interesting new features as well as some bugfixes. Check out the post to see what brings the latest version of our identity manager.
If you have a system connected to CzechIdM, e.g. MS Active Directory, on which you want to control provisioning operations (create, update, delete) the provisioning brake is the right choice. With provisioning brake you have control over how many operations for a specified system is done over a defined period of time. It is also possible to set a warning or disable limit for each operation. After exceeding the each limit administrators are notified by email.
Identity manager helps on the field of privileges management. It can solve tasks like roles evidence and distribution or role assignment to users. Another benefit of identity manager is that role assignment can usually be driven by workflow and user tasks. How does it work in CzechIdM, you will find out in the article.
Zveme Vás na workshop zabývající se problematikou Identity Managementu (IDM) vzhledem ke směrnici GDPR.
Téma: Identity Management a GDPR
Kdy: 14.11.2017 v 9:00 hodin
Kde: BCV solutions s. r. o., 7. května 1168/70, 106 00 Praha 4 – Chodov, 149 00
Workshop je bezplatný, počet míst je omezen. Občerstvení je zajištěno. Pdf pozvánka.
In the first part of our series, we discussed important features the company’s certificate authority should have. In today’s post, we will present the CAW, our execution engine. Read on.
Everyone knows that an identity manager automatically handles access rights of users in connected systems. But how does it do that? CzechIdM 7 comes with a set of default processes that do the job. What are they about you will find out in the article.
Many companies use an on-premise certificate authority (CA) for their internal purposes. Without a doubt, one specific function of the certificate authority in a company is handling users’ certificates. Those certificates are bound to physical persons and as such, they fit neatly into the identity management problematics.
For this reason, CzechIdM implements the CA functionality in the form of a module. In this short series of posts, we will describe basic workings of our CA implementation and how it can be fit into the company’s infrastructure.
In MS Active Directory, groups can have members not only from the same domain but also from other trusted domains. This is determined by “type” of a group. Such cross domain group membership can be now managed by CzechIdM.
We are glad you are using our product. Sometimes it happens, that you find some functionality that may not work correctly. Or you need some new features to be added to CORE, ACC or IC module. In this article we will show you, how to report the bug or the feature request.