Identity Fusion Blog

Identity Fusion Corporate Blogs & Articles

IT Vault Paradox

The IT Vault Paradox: IT Infrastructure and Cybersecurity

Introduction In the digital age, data security has emerged as a paramount concern for businesses. The threat of cyberattacks looms large, with hackers continually devising new..

Read More

Unlocking the IAM Future

Biometrics: Unlocking the IAM Future

Introduction In recent years, biometrics has emerged as a revolutionary technology in the field of identity management and access control. With the advancement of smart devices..

Read More

How do you Implement IAM? One Bite at a Time

How do you Implement IAM? One Bite at a Time

Introduction Oftentimes, tasks can seem daunting when you focus on the big picture and IAM implementations are no different. Successful IAM projects take a gradual, methodical..

Read More

Designing for Resiliency

On Tues, Dec 7th, Amazon suffered one of the largest outages in recent years as both businesses and consumers were impacted for more than 5 hours. Lines were backed up at the..

Read More

security alert neon sign with padlock

Identity Fusion Responds to Directory Services (OpenDJ) Security Advisory #201703

ForgeRock released Security Advisory #201703 covering two medium security vulnerabilities for Directory Services (OpenDJ) impacting versions 2.6 on up to 3.5.1 as well as the..

Read More

OpenIDM Property Value Substitution

Property value substitution can be a useful technique for customizing OpenIDM deployments across multiple environments.

Read More

keyboard with password reset buttons

Configuring OpenIDM Password Reset

ForgeRock OpenIDM is a powerful account management and data synchronization tool that provides many robust features out of the box. Some of these features must be enabled,..

Read More

OpenDJ and the Fine Art of Impersonation

Directory servers are often used in multi-tier applications to store user profiles, preferences, or other information useful to the application. Oftentimes the web application..

Read More

Hacking OpenAM – An Open Response to Radovan Semancik

I have been working with Sun, Oracle and ForgeRock products for some time now and am always looking for new and interesting topics that pertain to theirs and other open source..

Read More

OpenDJ Access Control Explained

An OpenDJ implementation will contain certain data that you would like to explicitly grant or deny access to. Personally identifiable information (PII) such as a user’s home..

Read More

The Next Generation of Identity Management

The face of identity is changing. Historically, it was the duty of an identity management solution to manage and control an individual’s access to corporate resources. Such..

Read More

OpenIDM 3.1: A Wake Up Call for Other Identity Vendors

Having implemented Sun, Novell, and Oracle provisioning solutions in the past, the one thing that I found to be lacking in ForgeRock’s OpenIDM solution was an easy to use..

Read More