Have you ever wanted to perform an LDAP search in a workflow to check for … well let’s just say a duplicate UNIX UID. In this example the account add workflow is checking to make sure the Unix UID is not in use by another account. The requirements in this instance are that UNIX UID […]
About Mark Adamson
This author has yet to write their bio.Meanwhile lets just say that we are proud Mark Adamson contributed a whooping 9 entries.
Entries by Mark Adamson
I wrote a different TDI blog discussing the Before Initialize Hook. That blog discussed setting the filter in an Iterator. Here is another use for the Before Initialize Hook, this time in a File System Connector. As I mentioned in prior PathMaker Group blogs Tivoli Directory Integrator (TDI) is a pretty neat tool that comes […]
As I mentioned in prior PathMaker Group blogs Tivoli Directory Integrator (TDI) is a pretty neat tool that comes packaged with IBM Tivoli Identity Manager (ITIM). TDI comes out of the box with a multitude of connectors that are used to as the name says, connect to different sources. One of the most common business […]
A provisioning policy in ITIM (IBM Tivoli Identity Manager) basically grants access and set entitlements to the ITIM managed services based on the provisioning policy membership. Each provisioning policy consists of information and settings on the following tabs: General Members Entitlements Of course, there are factors to consider: Role Memberships, service selection policies and policy join […]
Tivoli Directory Integrator (TDI) is a pretty neat tool that comes packaged with IBM Tivoli Identity Manager (ITIM). TDI comes out to the box with a multitude of connectors that are used to as the name says, connect to different sources. One of the most common business processes where TDI is used is to extract […]
Its audit time and you’re responsible for recertifying approximately 75 Active Directory Groups and each group has a membership of about 10 to 30 people. An email needs to be sent to every manager for them to confirm the person still needs to be a member of the group. You have to provide information to […]
Zombies are everywhere; they lurk in existing and new systems. These zombies don’t lust after our blood or consume our flesh. It is much worse than that. These zombies can cause companies to fail audits, they can be used for unauthorized access, and worst of all they can cost companies money. Technically we are talking […]
We all struggle with our electronic mailboxes. For every email we receive, there is some portion of our day devoted to opening and processing these emails. There is also serious time spent just deleting unwanted emails. Take this example. A manager has a number of contractors that she has reporting to her, let’s say about […]
Imagine this scenario. An employee gets married and her last name changes. Human Resources receives the required documentation and updates the employee’s last name. Now that the W2 has been changed, how long will it take this change to get propagated to the email system? How many people will be involved? How many phones calls […]
Who We Are
PathMaker Group is a specialized Security and Identity Management Consultancy, blending core technical and product expertise, consultative know-how, and extensive implementation experience.
635 Fritz Drive
Coppell, TX 75019
1250 Capital of Texas Hwy
Bldg 3, Suite 400
Austin, TX 78746
- Meeting IAM Gaps and Challenges with New Product Offerings
- Is it time to upgrade your IAM environment?
- Initial Credential Issuance: An Often Overlooked Area of a Secure Identity Posture
- With today’s increasing Mobile Enterprise Security Threats, do you have a strategy to mitigate the risk on your Corporate Network?