Welcome!

Identity Management Tips, Thoughts and Opinions

Matthew Pollicove

Subscribe to Matthew Pollicove : eMailAlertsEmail Alerts
Get Matthew Pollicove via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Matthew Pollicove

It's been a while since I posted here, but it's not because I'm not working on NetWeaver IDM or writing. I've been doing a lot of the former and a bit of the latter.  In order to help promote the growth of a NW IDM technical knowledge base, I've been posting most of my IDM specific things on the SAP Community Network Blog. I'll still be posting here from time to time, but it will more likely be architectural or opinion related pieces about IDM. To that point I'd like to talk about the seldom discussed Virtual Directory Server. I've always loved VDS and it's MaXware predecessor, MVD. There's just so much this product can do. While most of the SAP world is familiar with the Virtual Directory as a Web Services proxy for GRC or use with HCM, it is so powerful and flexible that it can do everything from provisioning to authorization and authentication management, to repre... (more)

SECUDE’s Secure Login Client Version 5.0 Enables Windows 7 Support

Security Journal on Ulitzer The need for an easy single, yet secure, login procedure has always been an elusive issue for many big organizations. Multiple user names and passwords, multiple logins, and the ensuing confusion and frustration consume much of a user's productivity in terms of time and energy. Secure Login Secure Login provides secure Single Sign-On and total landscape encryption for SAP supporting a variety of different authentication mechanisms including Active Directory, LDAP, SAP-ID, RADIUS, RSA SecurID®, SQL DB, and even smart cards. Secure Login is tightly inte... (more)

Linking Pulldown Attributes in NW IDM 7.1

One of the coolest things about NetWeaver Identity Manager is that there are always new tricks to learn. The development team keeps finding new and interesting ways to extend the functionality of the product. This, in turn, allows us to further extend what we can offer to our customers. Sometimes what I learn for a particular customer is brand-new, sometimes it's functionality that's been around for years, but either way, it's usually of use to someone, so I like to share when I can. Recently I was asked by a client how we could link two fields together so that for a given value ... (more)

SECUDE’s FinallySecure Enterprise Receives FIPS 140-2 Certification

SECUDE's hybrid full disk encryption solution, FinallySecure Enterprise, has received the FIPS 140-2 Level 1 certification. Commenting on the certification, Michael Kummer, Product Manager, SECUDE IT Security LLC, says, "SECUDE has been providing IT security solutions to large enterprises for more than 12 years. Our customers have always appreciated the quality and level of security SECUDE provides and this certification is a further continuation of that effort". The Federal Information Processing Standard 140-2 (FIPS 140-2) is a standard that describes US Federal government requ... (more)

Data Cleanliness

Whether working on user provisioning, password management, compliance, directory virtualization or meta-directory projects, the first step has always been about checking the data and making sure that it is clean. What constitutes clean data, and how do we get it that way? This is almost certainly the most important question that should be addressed when considering an Identity Management project. When considering User Provisioning project, there are a few basic things to consider: Is the data authoritative? It’s important that the data going into the provisioning solution comes f... (more)