Identity and Access Management

September, 2020 Secure and seamless learner access to online learning tools and content is more important than ever, especially if cut backs to your support options
August, 2020 Are you struggling with too many manual updates when learners move from one role to another? Are your students and faculty communicating frustration when trying to access resources?
November, 2019 Identity and access management (IAM) engineers are in high demand. We often hear from customers that the one key person who knew about their IAM solution and needs has moved on to
May, 2019 Shibboleth is a widely adopted federated identity solution that provides web single sign-on authentication services both within organizations and across organizational boundaries. 
January, 2019 This is the third post in a three part series. In the first part, which was posted more than a year and a half ago, I described Unicon's IAM Docker images. In the second post, I listed the Internet2 TIER program's Docker images. In this, the final post, I discuss the pros and cons of the various versions of the images.
January, 2019 This is the second posting in a three part series. In the first part, which was posted more than a year and a half ago, I described Unicon's IAM Docker images. In this post, I list the Internet2 TIER program's Docker images. In the final post, I discuss the pros and cons of the various related images.
November, 2018 When it comes to deploying a highly available CAS server, one of the chief concerns is to choose a technology that is capable of sharing CAS-generated tickets across multiple server nodes. The task of managing and administering CAS tickets is handled today by a Ticket Registry component that is backed by a variety of technologies able to persist, manage, and distribute ticket objects across the entire CAS cluster. Perhaps the most popular and better-adopted option in this area is a ticket registry solution backed by Hazelcast.
October, 2018 Modern CAS (versions 5.2+) has an ability to interrupt authentication flow after primary authentication principal trust has been established. This ability enables CAS to execute an intermediary piece of application logic before continuing to establish Web Single Sign On session and routing requests back to target applications. These intermediary interrupt components are able to implement logic, for example, to present notification messages to the user, provide options for redirects to external services, etc.
August, 2018 midPoint is a comprehensive Identity Governance and Administration (IGA) platform, used by organizations around the world to deal with Identity Provisioning, Identity Governance and Compliance, along with Access Management. As for the identity being a security perimeter, midPoint keeps an organization's internal network and external resources safe.
August, 2018 Unicon recently completed a project for the Colorado School of Mines to setup a continuous integration/continuous delivery (CI/CD) pipeline that can be used as a template for their work modernizing their application deployment processes going forward. Because of the School of Mines participation in the TIER Campus Success Program, Internet2 Grouper and Evolveum midPoint were chosen as the target deployments of this work.
Top