Author Archives: mattpollicove
Preventing SUNburn?
So it’s finally beginning. Identity Management vendors are percieving the departure of Sun IDM from the landscape. CA is now offering Sun Users the ability to switch over to CA’s IDM product. I’ve not heard much lately about what the eventual
Preventing SUNburn?
So it’s finally beginning. Identity Management vendors are percieving the departure of Sun IDM from the landscape. CA is now offering Sun Users the ability to switch over to CA’s IDM product. I’ve not heard much lately about what the eventual
Application Centric Identity?
I’ve been listening / reading to information lately on “Application Centric Identity ” and how it’s supposed to be the new wave in Identity Management. Frankly I’m a bit confused. Basically it sounds like what’s being discussed is the creation
Application Centric Identity?
I’ve been listening / reading to information lately on “Application Centric Identity ” and how it’s supposed to be the new wave in Identity Management. Frankly I’m a bit confused. Basically it sounds like what’s being discussed is the creation
The other side of the article
It’s seldom that I publish more than one blog post on a single piece, but Mark Diodati’s article “Changing times for identity management ” (login required) spoke of two main themes that I felt needed to be discussed. In an
The other side of the article
It’s seldom that I publish more than one blog post on a single piece, but Mark Diodati’s article “Changing times for identity management ” (login required) spoke of two main themes that I felt needed to be discussed. In an
The Transition from CRG to GRC
I’m an Identity and Access Management kind of guy. I don’t pretend to deny it, however sometimes it does cloud some of my views of the rest of the enterprise. Take the GRC concept for example. As an Identity Management
The Transition from CRG to GRC
I’m an Identity and Access Management kind of guy. I don’t pretend to deny it, however sometimes it does cloud some of my views of the rest of the enterprise. Take the GRC concept for example. As an Identity Management
Importing the SAP Provisioning Framework
One of the main reasons that one goes with SAP NetWeaver Identity Management is for the integration with other SAP modules. The main way that this is done is through something called the SAP Provisioning Framework which comes bundled with
Importing the SAP Provisioning Framework
One of the main reasons that one goes with SAP NetWeaver Identity Management is for the integration with other SAP modules. The main way that this is done is through something called the SAP Provisioning Framework which comes bundled with
Identity Theft and Enterprise Identity Management
When I tell people that I work in the Identity Management field, the first comment is usually something like, “Wow, identity theft, cool stuff. What should I be doing to protect myself?” Sometimes I’ll try to explain about user life
Identity Theft and Enterprise Identity Management
When I tell people that I work in the Identity Management field, the first comment is usually something like, “Wow, identity theft, cool stuff. What should I be doing to protect myself?” Sometimes I’ll try to explain about user life
MSKEYs and MSKEYVALUEs, Views and Tables
It does not take long before the NW IDM Administrator starts peeking under the hood to see what sits in the database. This is not a bad thing since there is a lot of good information that one can gain
MSKEYs and MSKEYVALUEs, Views and Tables
It does not take long before the NW IDM Administrator starts peeking under the hood to see what sits in the database. This is not a bad thing since there is a lot of good information that one can gain
A Need for Standards
I came across an interesting eWeek Blog entry. In it, Michael Vizard makes some interesting points about lack of standards in Identity Management. He makes some valid points in that there is no real standard for creating physical means proving
A Need for Standards
I came across an interesting eWeek Blog entry. In it, Michael Vizard makes some interesting points about lack of standards in Identity Management. He makes some valid points in that there is no real standard for creating physical means proving
VDS Logging
The astute observer will notice that the most recent releases of SAP’s NetWeaver Virtual Directory Server are missing the logging control buttons. There is a very good reason for this seemingly missing functionality. Much like NetWeaver Identity Management, VDS is also
VDS Logging
The astute observer will notice that the most recent releases of SAP’s NetWeaver Virtual Directory Server are missing the logging control buttons. There is a very good reason for this seemingly missing functionality. Much like NetWeaver Identity Management, VDS is also
Project Scope and Sustainability
One thing I’ve noticed when talking to people about Identity Management projects involves how to determine the project’s overall scope. “How do I scope this?” they will say to me. Now that’s kind of tough to answer right off the
Project Scope and Sustainability
One thing I’ve noticed when talking to people about Identity Management projects involves how to determine the project’s overall scope. “How do I scope this?” they will say to me. Now that’s kind of tough to answer right off the
You must be logged in to post a comment.