Welcome!

Identity Management Tips, Thoughts and Opinions

Matthew Pollicove

Subscribe to Matthew Pollicove : eMailAlertsEmail Alerts
Get Matthew Pollicove via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Matthew Pollicove

Security Journal on Ulitzer The need for an easy single, yet secure, login procedure has always been an elusive issue for many big organizations. Multiple user names and passwords, multiple logins, and the ensuing confusion and frustration consume much of a user's productivity in terms of time and energy. Secure Login Secure Login provides secure Single Sign-On and total landscape encryption for SAP supporting a variety of different authentication mechanisms including Active Directory, LDAP, SAP-ID, RADIUS, RSA SecurID®, SQL DB, and even smart cards. Secure Login is tightly integrated into SAP by making use of its Secure Network Communications (SNC) framework and by fully supporting SAP's Cryptographic Library (SAPCryptolib) which means that no third party or SECUDE components need to be installed on the SAP server. However, SECUDE also provides its own cryptograph... (more)

SECUDE’s FinallySecure Enterprise Receives FIPS 140-2 Certification

SECUDE's hybrid full disk encryption solution, FinallySecure Enterprise, has received the FIPS 140-2 Level 1 certification. Commenting on the certification, Michael Kummer, Product Manager, SECUDE IT Security LLC, says, "SECUDE has been providing IT security solutions to large enterprises for more than 12 years. Our customers have always appreciated the quality and level of security SECUDE provides and this certification is a further continuation of that effort". The Federal Information Processing Standard 140-2 (FIPS 140-2) is a standard that describes US Federal government requ... (more)

Too Much in the JAR

Recently had a problem where Import/Export was not working.  I kept getting an interesting Error Message: What was really interesting about this was the user that was referenced, mxmc_admin.  Now this is interesting, because during the Identity Store creation process, you are prompted to use mxmc_rt as the user and there is no time during the install that you are asked to create a JAVA based connection string using mxmc_admin. This started a great deal of troubleshooting and conversations with people who have a great deal of knowledge with IDM's moving parts. Ultimately we wound... (more)

IDM – too Complicated?

Based on what I’ve been hearing from the SAP NetWeaverIdentity Management Community there have been some grumbles about the Complexityand Functionality in NW IDM. This is not going to be a slam on SAP, sincealmost everybody recognizes that IDM has improved immeasurably since therelease of NetWeaver Identity Management 7.0. I’d like to address some of the most common questions/ comments I’veheard. Hopefully we’ll be able to start a little bit of a conversation here… Q1. Why doesn’t IDM just work out of the box? A1. Why doesn’t any Enterprise System just work out of thebox?  Folks, ... (more)

The Stages of Identity

Recently I've been thinking about what happens to an identity through its life cycle and how the identity data is treated during this process.  I think you will also see that the Enterprise itself has differing methods of dealing with it as well. I am considering this to be the beginning of a framework and nomenclature that one can use for expressing how people relate to their Identity data on a number of different levels. I think we can pretty much consider this to be a "work in progress," and I would greatly appreciate feedback. So why do we need this, anyway? I have observed ... (more)