Choosing Specific Factors in OIE with the API

Okta Identity Engine provides increased flexibility for Authentication with Application Level Policies and easy to configure passwordless sign-in experiences. These are covered extensively in our deployment guides: Authentication policies deployment guide and Passwordless authentication deployment guide. It also provides a simplified administrator experience by moving from Factor sequencing to Assurance Models. This new experience is simple … Continue reading Choosing Specific Factors in OIE with the API

A Look at IAM in Red Hat Enterprise Linux

This is a trimmed down version of an article I published on LinkedIn on Jun 11, 2020 (https://www.linkedin.com/pulse/look-iam-red-hat-enterprise-linux-david-edwards-iamdavid-/). For a recent engagement I had to 'page back in' long-forgotten aspects of identity and access management (IAM) for Unix/Linux, specifically the Red Hat Enterprise Linux (RHEL) operating system. I couldn’t find a comprehensive guide to all … Continue reading A Look at IAM in Red Hat Enterprise Linux

IGA & RACF – How Effectively Can You Manage the Risk of Mainframe Users?

This article was originally posted on LinkedIn on 29 August, 2019 (https://www.linkedin.com/pulse/iga-racf-how-effectively-can-you-manage-risk-users-david/). Way back in the late 80’s I was a trainee programmer learning all things green-screen, like ISPF, JCL, CICS and Cobol. Colleagues laughed, asking me why I was bothering given the mainframe would be gone in five years. Here we are thirty years … Continue reading IGA & RACF – How Effectively Can You Manage the Risk of Mainframe Users?

How Much Workflow Do You Need for Your IGA Project?

Workflow is a core capability in any Identity Governance and Administration (IGA) deployment; IGA is all about automating the business processes around managing and governing users and their access.  IGA deployments often take much longer than anticipated and don’t achieve all of what the project set out to do. Why? There are many factors, but … Continue reading How Much Workflow Do You Need for Your IGA Project?

IGDM Part 3 – Implementing the Identity Governance Data Model

This article is the third in a series of three looking at a proposed common Identity Governance Data Model (IGDM). This third article suggests an implementation of the module using a SCIM-like approach. This model attempts to address the needs of managing heterogeneous complex target system access models in an Identity Governance and Administration (IGA) … Continue reading IGDM Part 3 – Implementing the Identity Governance Data Model

IGDM Part 2 – Validating the Proposed Identity Governance Data Model

This article is the second in a series of three looking at a proposed common Identity Governance Data Model (IGDM). This second article validates the model against some common complex applications. This model attempts to address the needs of managing heterogeneous complex target system access models in an Identity Governance and Administration (IGA) environment. The … Continue reading IGDM Part 2 – Validating the Proposed Identity Governance Data Model

IGDM Part 1 – Proposing an Identity Governance Data Model

This article is the first in a series of three looking at a proposed common Identity Governance Data Model (IGDM). This first article proposes the model. This model attempts to address the needs of managing heterogeneous complex target system access models in an Identity Governance and Administration (IGA) environment. The proposed IGDM is designed to … Continue reading IGDM Part 1 – Proposing an Identity Governance Data Model