Bill Nelson

In Pursuit of Trust: Exceeding Expectations in Project Delivery

Introduction We have recently concluded a project involving the migration of a major global provider of managed cloud computing services from CA Directory to a modern and more..

Read More

How do you Implement IAM? One Bite at a Time

How do you Implement IAM? One Bite at a Time

Introduction Oftentimes, tasks can seem daunting when you focus on the big picture and IAM implementations are no different. Successful IAM projects take a gradual, methodical..

Read More

Designing for Resiliency

On Tues, Dec 7th, Amazon suffered one of the largest outages in recent years as both businesses and consumers were impacted for more than 5 hours. Lines were backed up at the..

Read More

security alert neon sign with padlock

Identity Fusion Responds to Directory Services (OpenDJ) Security Advisory #201703

ForgeRock released Security Advisory #201703 covering two medium security vulnerabilities for Directory Services (OpenDJ) impacting versions 2.6 on up to 3.5.1 as well as the..

Read More

OpenIDM Property Value Substitution

Property value substitution can be a useful technique for customizing OpenIDM deployments across multiple environments.

Read More

keyboard with password reset buttons

Configuring OpenIDM Password Reset

ForgeRock OpenIDM is a powerful account management and data synchronization tool that provides many robust features out of the box. Some of these features must be enabled,..

Read More

OpenDJ and the Fine Art of Impersonation

Directory servers are often used in multi-tier applications to store user profiles, preferences, or other information useful to the application. Oftentimes the web application..

Read More

Hacking OpenAM – An Open Response to Radovan Semancik

I have been working with Sun, Oracle and ForgeRock products for some time now and am always looking for new and interesting topics that pertain to theirs and other open source..

Read More

OpenDJ Access Control Explained

An OpenDJ implementation will contain certain data that you would like to explicitly grant or deny access to. Personally identifiable information (PII) such as a user’s home..

Read More

The Next Generation of Identity Management

The face of identity is changing. Historically, it was the duty of an identity management solution to manage and control an individual’s access to corporate resources. Such..

Read More

OpenIDM 3.1: A Wake Up Call for Other Identity Vendors

Having implemented Sun, Novell, and Oracle provisioning solutions in the past, the one thing that I found to be lacking in ForgeRock’s OpenIDM solution was an easy to use..

Read More

OpenDJ Attribute Uniqueness (and the Effects on OpenAM)

In real life we tend to value those traits that make us unique from others; but in an identity management deployment uniqueness is essential to the authentication process and..

Read More