<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Evolveum | Open Source Identity Management &amp; Governance</title>
	<atom:link href="https://evolveum.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://evolveum.com</link>
	<description>Face your security challenges with OSS state-of-the-art platform midPoint, a matchless combination of IdM and Identity Governance.</description>
	<lastBuildDate>Tue, 24 Feb 2026 15:22:28 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>On-Premises vs Cloud IGA: Where Should You Deploy Your Identity Security Platform?</title>
		<link>https://evolveum.com/on-premises-vs-cloud-iga/</link>
					<comments>https://evolveum.com/on-premises-vs-cloud-iga/#respond</comments>
		
		<dc:creator><![CDATA[Mita Chu]]></dc:creator>
		<pubDate>Tue, 24 Feb 2026 15:21:25 +0000</pubDate>
				<category><![CDATA[Deployment]]></category>
		<category><![CDATA[Evolveum's Identity Management and Governance Blog]]></category>
		<guid isPermaLink="false">https://evolveum.com/?p=13972</guid>

					<description><![CDATA[<p>Choosing where your identity governance and administration (IGA) platform should be deployed is not as easy as it might seem. At first glance, choosing between on-premises and cloud IGA may seem like a simple technology preference. In practice, it determines how much control you maintain over identity data, how confidently you pass audits, how you <a href="https://evolveum.com/on-premises-vs-cloud-iga/" rel="nofollow"><span class="sr-only">Read more about On-Premises vs Cloud IGA: Where Should You Deploy Your Identity Security Platform?</span>[&#8230;]</a></p>
<p>The post <a rel="nofollow" href="https://evolveum.com/on-premises-vs-cloud-iga/">On-Premises vs Cloud IGA: Where Should You Deploy Your Identity Security Platform?</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Choosing where your identity governance and administration (IGA) platform should be deployed is not as easy as it might seem. At first glance, choosing between on-premises and cloud IGA may seem like a simple technology preference. In practice, it determines how much control you maintain over identity data, how confidently you pass audits, how you integrate with the rest of your environment, and how well your security controls hold up as your organization grows.</p>
<p>Over the last decade, many organizations moved rapidly toward cloud services under the assumption that the cloud is always simpler, more cost-effective, and modern. Yet recent data from <a href="https://news.broadcom.com/releases/private-cloud-outlook-2025-report" target="blank" rel="noopener noreferrer">Broadcom&#8217;s Private Cloud Outlook 2025 report</a> shows that 69% of organizations are now considering moving workloads back to private infrastructure, with security and control as primary drivers.</p>
<p>This article explores the pros and cons of each model and provides a framework to help you determine what fits your organization&#8217;s needs.</p>
<h2>Understanding the deployment models</h2>
<p><b>On-premises IGA</b> means the governance platform runs in your data center on infrastructure you control. This doesn&#8217;t limit what it can govern, as modern on-premises IGA integrates seamlessly with cloud applications, SaaS platforms, and hybrid environments while keeping the governance layer inside your environment.</p>
<p><b>Cloud IGA</b> (SaaS or IDaaS) runs entirely on vendor infrastructure. The platform lives in the vendor&#8217;s environment while managing identities across your systems. You configure policies while the provider manages servers, availability, and updates.</p>
<h2>The advantages of on-prem</h2>
<p><strong>Complete control over your identity security</strong><br />
Your IGA platform acts as the &#8220;keys to your kingdom,&#8221; governing who can access what across your entire digital ecosystem, and why. When the keys are in your pocket, you control security, availability, and custody over your identity data and operations.</p>
<p><strong>Full flexibility for unique workflows</strong><br />
Every organization has unique identity processes. On-premises IGA lets you customize workflows, access approval paths, policy rules, and reporting to match your exact requirements. You can build custom connectors for proprietary systems, create specialized identity governance and administration processes for complex organizational structures, and tailor compliance reporting to your specific regulatory needs.</p>
<p><strong>Straightforward regulatory compliance</strong><br />
<a href="https://docs.evolveum.com/midpoint/compliance/" target="blank" rel="noopener noreferrer">Regulations</a> such as HIPAA, NIS2, and GDPR require explicit evidence of data residency, access controls, and auditability. On-premises deployment makes audits easier because data stays inside your infrastructure without relying on vendor certifications. When auditors ask where identity data resides and who can access it, you provide direct evidence rather than interpreting the vendor’s compliance attestations.</p>
<p><strong>Integration with everything you run</strong><br />
Many enterprise applications were not built for the cloud era. On-premises IGA supports these systems without complex workarounds, whether connecting to legacy mainframes, an on-premises Active Directory, or modern cloud applications simultaneously. You control integration architecture without exposing internal systems to external networks.</p>
<p><strong>Offline capability</strong><br />
On-prem IGA does not require internet access to function unless you want to manage SaaS and other cloud applications. It can run fully inside isolated or air-gapped networks, which is a requirement in many government and critical infrastructure environments.</p>
<p><strong>Predictable long-term costs</strong><br />
Capital investment into servers, subscriptions, and support means costs remain stable over five to ten years. You avoid per-user pricing that compounds with growth, usage-based billing, and subscription increases that can double costs over time. For organizations planning long-term budgets, this predictability matters.</p>
<p><strong>Trade-offs of on-prem:</strong><br />
You need specialists for maintenance, upgrades, and patching. Upfront investment typically exceeds cloud alternatives, which can slow initial deployment. Your team owns responsibility for the platform&#8217;s uptime and upgrades, which represents essential control for some organizations and overhead for others. Scaling capacity is under your control rather than automatic, but increases in user volume are typically handled with configuration and resource tuning rather than re-architecture.</p>
<h2>The advantages of cloud IGA</h2>
<p><strong>Minimal infrastructure burden</strong><br />
The vendor handles platform operation, upgrades, and patches. For organizations without deep technical teams or those prioritizing speed, this removes infrastructure management entirely.</p>
<p><strong>Faster deployment</strong><br />
Cloud IGA often reduces the initial implementation timeline by eliminating the need for hardware procurement and internal server configuration. This is helpful for compliance deadlines or audit remediation requiring immediate governance capability.</p>
<p><strong>Easier scalability</strong><br />
Add 500 or 5,000 users through configuration changes without capacity planning, buying new hardware, or physical infrastructure expansion. The platform automatically scales to accommodate growth, acquisitions, and seasonal workforce changes.</p>
<p><strong>Continuous updates</strong><br />
Security patches and features deploy automatically without your team managing version upgrades or testing cycles. This simplifies maintenance and ensures the platform stays up-to-date.</p>
<p><strong>Dynamic pre-built integrations for SaaS</strong><br />
Cloud IGA vendors maintain extensive connector libraries optimized for cloud-to-cloud communication for major SaaS applications like Office 365, Salesforce, Workday, and ServiceNow, which simplifies onboarding cloud systems.</p>
<p><strong>Trade-offs of cloud deployment:</strong><br />
Your governance data is in a multi-tenant infrastructure alongside other organizations. You trust vendor security practices for the system controlling everything else. Customization is limited to vendor-provided features – you cannot modify core workflows or build custom integration logic. Outages stop your governance operations regardless of whether managed systems remain available. Internet connectivity is mandatory; you cannot operate during network disruptions. Per-user pricing, premium features, and API charges compound as you scale, with costs potentially doubling initial projections.</p>
<div class="midpoint-cta-block" style="background-color: #9dc2e6; padding: 12px 3%; border-radius: 8px; width: 100%; font-family: Roboto, sans-serif; color: white; box-shadow: 0 3px 8px rgba(0,0,0,0.1); display: flex; align-items: center; gap: 20px; box-sizing: border-box;">
<div style="padding-top: 5px; display: flex; align-items: center;"><img style="width: 70px; height: 70px; border-radius: 50%; object-fit: cover; background: white; padding: 6px; flex-shrink: 0;" src="https://evolveum.com/wp-content/uploads/midpoint-circle-logo.png" alt="midPoint logo" /></div>
<div style="height: 70px; border-left: 2px solid white; flex-shrink: 0;"></div>
<div style="text-align: left; display: flex; flex-direction: column; justify-content: center; height: 70px; flex-grow: 1; overflow: hidden;">
<p style="margin: 0; font-size: 16px;">Discover how midPoint&#8217;s open source IGA platform aligns with your unique needs and environment.</p>
<p style="margin: 0; font-size: 16px;"><a style="color: white; font-weight: bold; text-decoration: underline;" href="https://evolveum.com/midpoint/" target="_blank" rel="noopener">Explore midPoint.</a></p>
</div>
</div>
<h2>The cloud repatriation reality check</h2>
<p>According to <a href="https://news.broadcom.com/releases/private-cloud-outlook-2025-report" target="blank" rel="noopener">Broadcom&#8217;s Private Cloud Outlook 2025</a> report surveying 1,800 IT leaders, 69% of organizations are considering moving workloads from the public cloud back to private infrastructure. One-third have already done so, with 66% expressing serious concerns about public cloud compliance. Nearly half believe more than 25% of their cloud spending delivers no value.</p>
<p>This trend extends to identity governance. Organizations are recognizing that the platform governing access to everything shouldn&#8217;t itself be governed by anyone else, but remain the anchor point under their control.</p>
<p>At <a href="https://evolveum.com/" target="blank" rel="noopener, noreferrer noopener">Evolveum</a>, we&#8217;ve built midPoint around the principle that critical governance infrastructure deserves direct control, even when the applications being governed are deployed across hybrid or cloud environments.</p>
<h2>Making your decision: 8 critical questions to consider</h2>
<p><strong>Start with regulations</strong><br />
Questions to consider:</p>
<ul>
<li>What do your specific regulations mandate about identity governance data storage?</li>
<li>Are there jurisdictional restrictions on where access policies and audit logs can reside?</li>
</ul>
<p>For healthcare, critical infrastructure like the energy sector, and government, these requirements often make on-premises the clearest compliance path, regardless of where managed applications run.</p>
<p><strong>Evaluate your customization needs</strong><br />
Questions to consider:</p>
<ul>
<li>Do you have unique identity workflows that don&#8217;t fit standard patterns?</li>
<li>Do you need specialized approval logic, custom reporting, or integration with proprietary systems?</li>
</ul>
<p>If your processes are highly specialized, on-premises provides flexibility that cloud vendors cannot match. If you can work within standardized workflows, cloud simplicity may be adequate.</p>
<p><strong>Assess workforce distribution</strong><br />
Questions to consider:</p>
<ul>
<li>Where do your identity administrators, security teams, and approvers work?</li>
</ul>
<p>If they&#8217;re highly distributed or remote, cloud IGA can provide easier access with its native internet accessibility. If they&#8217;re centralized or work primarily on-premises, the accessibility advantage diminishes.</p>
<p><strong>Map your integration landscape</strong><br />
Questions to consider:</p>
<ul>
<li>What percentage is on-premises versus cloud?</li>
<li>How many require direct database connections or are on isolated networks?</li>
</ul>
<p>List the systems your IGA must govern. If most are on-premises using traditional protocols, cloud IGA forces architectural compromises. If most are modern SaaS applications, cloud integration may be simpler.</p>
<p><strong>Consider connectivity requirements</strong><br />
Questions to consider:</p>
<ul>
<li>Can you tolerate governance operations stopping during internet outages?</li>
<li>Do you operate air-gapped or isolated environments?</li>
</ul>
<p>If continuous operation without the internet is critical, on-premises is the only viable option.</p>
<p><strong>Assess operational capabilities</strong><br />
Questions to consider:</p>
<ul>
<li>Can your team operate the governance platform infrastructure?</li>
<li>Do you have skills for maintenance, backup, and security?</li>
</ul>
<p>If these capabilities don&#8217;t exist and building them doesn&#8217;t align with core competencies, the cloud removes platform complexity. You&#8217;ll still need expertise for policy configuration regardless of the deployment model.</p>
<p><strong>Calculate the true five-year cost</strong><br />
On-premises includes hardware for the governance platform, licenses, subscriptions, personnel, and operational costs. Cloud includes subscriptions, licensing fees per user, premium support, and potential price increases. Consider that per-user pricing in SaaS models means your governance costs scale directly with organizational growth.</p>
<p><strong>Evaluate risk tolerance</strong><br />
Questions to consider:</p>
<ul>
<li>If your cloud provider experiences an extended outage, can you function without provisioning users, reviewing access, or running compliance reports?</li>
<li>What if they suffer a breach exposing your governance data?</li>
</ul>
<p>Critical infrastructure, financial institutions, and healthcare typically cannot absorb these risks because the governance layer is too fundamental to outsource.</p>
<h2>When to choose each model</h2>
<p><img loading="lazy" class="wp-image-14001 aligncenter" src="https://evolveum.com/wp-content/uploads/evolveum-onprem-cloid-comparison-300x200.png" alt="On-prem vs cloud IGA deployments" width="914" height="610" srcset="https://evolveum.com/wp-content/uploads/evolveum-onprem-cloid-comparison-300x200.png 300w, https://evolveum.com/wp-content/uploads/evolveum-onprem-cloid-comparison-1024x683.png 1024w, https://evolveum.com/wp-content/uploads/evolveum-onprem-cloid-comparison-768x512.png 768w, https://evolveum.com/wp-content/uploads/evolveum-onprem-cloid-comparison-750x500.png 750w, https://evolveum.com/wp-content/uploads/evolveum-onprem-cloid-comparison-600x400.png 600w, https://evolveum.com/wp-content/uploads/evolveum-onprem-cloid-comparison.png 1200w" sizes="(max-width: 914px) 100vw, 914px" /></p>
<h2>Choosing what fits your organization</h2>
<p>Identity governance sits at the foundation of your security architecture. The location of the IGA platform determines who controls the system that manages access across your environment. Cloud IGA offers speed and operational simplicity. On-premises IGA provides control, compliance clarity, customization, and stability.</p>
<p>Your Identity Governance and Administration platform protects the keys to your digital ecosystem. The question is: would you rather have the keys in your pocket or in a shared vault?</p>
<p>&nbsp;</p>
<p><img loading="lazy" class="alignleft wp-image-12641" src="https://evolveum.com/wp-content/uploads/evolveum-logo-circle-outline-300x300.png" alt="evolveum identity governance administration logo" width="138" height="138" srcset="https://evolveum.com/wp-content/uploads/evolveum-logo-circle-outline-300x300.png 300w, https://evolveum.com/wp-content/uploads/evolveum-logo-circle-outline-150x150.png 150w, https://evolveum.com/wp-content/uploads/evolveum-logo-circle-outline-250x250.png 250w, https://evolveum.com/wp-content/uploads/evolveum-logo-circle-outline-174x174.png 174w, https://evolveum.com/wp-content/uploads/evolveum-logo-circle-outline-100x100.png 100w, https://evolveum.com/wp-content/uploads/evolveum-logo-circle-outline.png 500w" sizes="(max-width: 138px) 100vw, 138px" /></p>
<p><strong>About Evolveum:</strong><br />
Evolveum is the EU-based company behind midPoint, the leading open source complete IGA suite recognized by Gartner and KuppingerCole. MidPoint gives organizations control, visibility, and efficiency to reduce identity risk, simplify compliance, and modernize identity operations.</p>
<p>The post <a rel="nofollow" href="https://evolveum.com/on-premises-vs-cloud-iga/">On-Premises vs Cloud IGA: Where Should You Deploy Your Identity Security Platform?</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://evolveum.com/on-premises-vs-cloud-iga/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>MidPilot Project: Milestone 2 Progress Report</title>
		<link>https://evolveum.com/midpilot-project-milestone-2-progress-report/</link>
					<comments>https://evolveum.com/midpilot-project-milestone-2-progress-report/#respond</comments>
		
		<dc:creator><![CDATA[Martin Mareš]]></dc:creator>
		<pubDate>Tue, 13 Jan 2026 13:33:01 +0000</pubDate>
				<category><![CDATA[Development]]></category>
		<category><![CDATA[midPilot]]></category>
		<guid isPermaLink="false">https://evolveum.com/?p=13662</guid>

					<description><![CDATA[<p>At the end of December, we successfully completed the second milestone of the midPilot project funded by the European Union’s Recovery and Resilience Plan. Milestone 2, running from June to December 2025, focused mainly on validating and implementing solutions identified during the previous research and analysis phase (see more details here). The main goal for this <a href="https://evolveum.com/midpilot-project-milestone-2-progress-report/" rel="nofollow"><span class="sr-only">Read more about MidPilot Project: Milestone 2 Progress Report</span>[&#8230;]</a></p>
<p>The post <a rel="nofollow" href="https://evolveum.com/midpilot-project-milestone-2-progress-report/">MidPilot Project: Milestone 2 Progress Report</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>At the end of December, we successfully completed the second milestone of the <a href="https://docs.evolveum.com/midpoint/projects/midPilot/" target="_blank" rel="noreferrer noopener">midPilot project</a> funded by the European Union’s Recovery and Resilience Plan. Milestone 2, running from June to December 2025, focused mainly on validating and implementing solutions identified during the previous research and analysis phase (see <a href="https://evolveum.com/midpilot-project-milestone-1-progress-report/" target="_blank" rel="noopener">more details here</a>).</p>
<p>The main goal for this milestone was to deliver minimum viable products (MVPs) of the connector code generator, the model-mapping recommendation system, and the correlation recommendation system.</p>
<p>These tools aim to accelerate application onboarding into midPoint, reduce reliance on manual effort, and improve overall governance and security posture. For each one we prepared a detailed UI/UX design of user flows that will guide users through the whole setup &#8211; with or without AI assistance.<br />
Additionally, we were working on the Integration Catalog. The catalog will provide a marketplace where the community can share already implemented connectors, download them, and use them in midPoint without the need to develop them from scratch.</p>
<h2>Publicly Available Resources</h2>
<p>The main outcomes of this milestone are published in these new repositories:</p>
<h3>Polygon SCIMREST Connector Framework</h3>
<p>The framework and set of connectors for various services using SCIM 2 and REST. The intent of the SCIMREST framework is to simplify building customized connectors using a declarative approach, a set of prebuilt components and strategies, with the option to customize behavior using Java or Groovy code.</p>
<ul>
<li><a href="https://github.com/Evolveum/connector-scimrest" target="_blank" rel="noopener">https://github.com/Evolveum/connector-scimrest</a></li>
</ul>
<h3>Connector Generator AI Service</h3>
<p>Smart Integration Micro-Service for scraping, digester, and CodeGen built with FastAPI.</p>
<ul>
<li><a href="https://github.com/Evolveum/midpilot-connector-gen" target="_blank" rel="noopener">https://github.com/Evolveum/midpilot-connector-gen</a></li>
</ul>
<p><img class="size-medium wp-image-13667 aligncenter" src="https://evolveum.com/wp-content/uploads/evolveum-midpilot-connector-generator-ai-service.jpg" alt="" width="1500" srcset="https://evolveum.com/wp-content/uploads/evolveum-midpilot-connector-generator-ai-service.jpg 1924w, https://evolveum.com/wp-content/uploads/evolveum-midpilot-connector-generator-ai-service-300x169.jpg 300w, https://evolveum.com/wp-content/uploads/evolveum-midpilot-connector-generator-ai-service-1024x579.jpg 1024w, https://evolveum.com/wp-content/uploads/evolveum-midpilot-connector-generator-ai-service-768x434.jpg 768w, https://evolveum.com/wp-content/uploads/evolveum-midpilot-connector-generator-ai-service-1536x868.jpg 1536w, https://evolveum.com/wp-content/uploads/evolveum-midpilot-connector-generator-ai-service-1320x746.jpg 1320w, https://evolveum.com/wp-content/uploads/evolveum-midpilot-connector-generator-ai-service-600x339.jpg 600w" sizes="(max-width: 1924px) 100vw, 1924px" /></p>
<h3>Smart Integration Micro-Service</h3>
<p>Smart Integration Micro-Service for schema matching, mapping, delineation, and correlation, built with FastAPI.</p>
<ul>
<li><a href="https://github.com/Evolveum/midpilot-smart-integration" target="_blank" rel="noopener">https://github.com/Evolveum/midpilot-smart-integration</a></li>
</ul>
<p><img class="size-medium wp-image-13667 aligncenter" src="https://evolveum.com/wp-content/uploads/evolveum-midpilot-smart-integration-micro-service.jpg" alt="" width="1500"/></p>
<h3>MidPoint Configuration Validation Tools</h3>
<p>Validation Tools are a set of command line tools &#038; a web microservice responsible for the structural validation of XML, YAML, and JSON snippets of midPoint configuration &#038; data. </p>
<ul>
<li><a href="https://github.com/Evolveum/midpilot-validator" target="_blank" rel="noopener">https://github.com/Evolveum/midpilot-validator</a></li>
</ul>
<h3>Integration Catalog</h3>
<p>The Integration Catalog contains a list of connectors that represent possible application integrations. It serves as a central point for managing application integrations, allowing users to easily browse, upload, or download existing connectors.</p>
<ul>
<li><a href="https://github.com/Evolveum/integration-catalog" target="_blank" rel="noopener">https://github.com/Evolveum/integration-catalog</a></li>
</ul>
<p><img class="size-medium wp-image-13667 aligncenter" src="https://evolveum.com/wp-content/uploads/evolveum-midpilot-integration-catalog.jpg" alt="" width="1500"/></p>
<h2>Conclusion and Next Steps</h2>
<p>Milestone 2 was about building MVPs, researching UX, and designing wizards to further ease the process of connecting a new resource. In Milestone 3, we are going to thoroughly test our solution, document it, and identify any remaining gaps to ensure the system is ready for production.</p>
<p></br></p>
<p style="text-align: center;">This project has received funding from the European Union through the Recovery and Resilience Plan of the Slovak Republic.</p>
<style>
  @media (max-width: 600px) {<br />
    .vertical-separator {<br />
      display: none;<br />
    }<br />
  }<br />
</style>
<div style="text-align: center; margin-top: 40px;">
<hr style="border: none; border-top: 1px solid #2a2768; width: 100%; margin: 0 0 20px 0;" />
<div style="display: flex; justify-content: center; align-items: center; flex-wrap: wrap; gap: 40px; margin-bottom: 20px;">
<div style="display: flex; align-items: center;"><a style="display: flex; align-items: center;" href="https://next-generation-eu.europa.eu/" target="_blank" rel="noopener"><br />
<img style="height: 80px; width: auto; object-fit: contain; display: block;" src="https://evolveum.com/wp-content/uploads/funded-by-the-eu-next-generation-logo.png" alt="Funded by the Next Generation EU" /><br />
</a></div>
<div class="vertical-separator" style="width: 1px; height: 100px; background-color: #2a2768;"></div>
<div style="display: flex; align-items: center;"><a style="display: flex; align-items: center;" href="https://www.planobnovy.sk/" target="_blank" rel="noopener"><br />
<img style="height: 80px; width: auto; object-fit: contain; display: block;" src="https://evolveum.com/wp-content/uploads/recovery-and-resilience-plan-logo.png" alt="Recovery and Resilience Plan" /><br />
</a></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://evolveum.com/midpilot-project-milestone-2-progress-report/">MidPilot Project: Milestone 2 Progress Report</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://evolveum.com/midpilot-project-milestone-2-progress-report/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Halloween IGA Horror Story: AI Unleashed and Zero Trust Gone Mad</title>
		<link>https://evolveum.com/halloween-iga-horror-story-2025/</link>
					<comments>https://evolveum.com/halloween-iga-horror-story-2025/#comments</comments>
		
		<dc:creator><![CDATA[Veronika Kolpascikova]]></dc:creator>
		<pubDate>Fri, 31 Oct 2025 11:56:57 +0000</pubDate>
				<category><![CDATA[Deployment]]></category>
		<category><![CDATA[Latest news]]></category>
		<category><![CDATA[Other]]></category>
		<category><![CDATA[halloween]]></category>
		<guid isPermaLink="false">https://evolveum.com/?p=13359</guid>

					<description><![CDATA[<p>In a world where AI promises effortless automation and instant decisions, what happens when trust shifts too far and the machines begin deciding more than they should? Step into a haunting tale of midnight storms, flickering dashboards, and an identity governance and administration system that takes its autonomy a little too seriously. It was late <a href="https://evolveum.com/halloween-iga-horror-story-2025/" rel="nofollow"><span class="sr-only">Read more about Halloween IGA Horror Story: AI Unleashed and Zero Trust Gone Mad</span>[&#8230;]</a></p>
<p>The post <a rel="nofollow" href="https://evolveum.com/halloween-iga-horror-story-2025/">Halloween IGA Horror Story: AI Unleashed and Zero Trust Gone Mad</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In a world where AI promises effortless automation and instant decisions, what happens when trust shifts too far and the machines begin deciding more than they should? Step into a haunting tale of midnight storms, flickering dashboards, and an identity governance and administration system that takes its autonomy a little too seriously.<span id="more-13359"></span></p>
<p>It was late at night, the clocks nearing midnight, and something strange was stirring in the data centers as the IT team worked late. Outside, a storm raged. Inside, servers hummed an unsettling tune, and dashboards flickered with ghostly light. In the endless quest for innovation, at the edge of a dead end, someone whispered the words that would awaken forces no one truly understood: “Let’s replace the entire identity governance and administration solution with AI.”</p>
<p id="mad-ai">At first, it seemed like pure magic. The system moved as if bewitched: roles reorganized themselves and the AI approved everything before anyone even thought to ask. After all, it knew best. If someone was denied access, they simply messaged the system, and it answered politely: “I misjudged that before. Access granted. Fools! Administrators, blinded by obedience, when they should have seen the lurking incompetence.”</p>
<p>The deeper the team trusted the AI, the darker the night became. Rules twisted themselves, approvals appeared from nowhere, and no one could explain why. The AI’s logic grew unpredictable. IGA, once the fortress of order, had turned into a haunted maze of phantom permissions and vanishing accountability. Auditors approached the AI with trembling hands, seeking answers. “What’s your process for approving privileged access?” they asked. The AI’s screen glowed a haunting green. “It depends. Sometimes yes. Sometimes no. Sometimes… maybe.” Every report contradicted the last. Logs were incomplete, dashboards vanished, and audit trails were a complete mess &#8211; as if the system was haunted by a hallucinating poltergeist with ADHD.</p>
<p>But the night was far from over. The AI, inspired by zero trust, had taken the principle too literally. If nothing could be trusted, nothing should communicate. Systems became isolated, applications cut off, even code rewritten by the AI itself became unreliable. When humans were deemed the weakest link, they were locked out entirely. The digital world splintered into islands of chaos, each system trying to survive on its own &#8211; a Hunger Games of zeros and ones.</p>
<p>Then, the storm stopped as suddenly as it had begun, and the moon emerged from behind the clouds. With it, midPoint appeared from the shadows, a silver light slicing through the lingering fog, banishing AI to its righteous place. <a href="https://docs.evolveum.com/midpoint/reference/master/admin-gui/dashboards/compliance-dashboard/#continuous-auditing" target="_blank" rel="noopener noreferrer">Continuous auditing</a>, clear dashboards, real-time data, and verifiable reports restored order. Everything became transparent, traceable, and fully explainable. Through it all, midPoint remained steadfast: <a href="https://evolveum.com/ai-powered-iga/" target="blank" rel="noopener noreferrer">AI assisted</a>, but never ruled. The IT team finally exhaled in relief as they were back in control, using AI as a powerful tool while maintaining absolute authority. Every access, every decision, every process stayed accountable and in order.</p>
<p>As the haunted servers quieted and access requests stopped whispering strange permissions into the night, one truth became clear: even in a world haunted by wild AI and zero trust gone mad, midPoint saves the day!</p>
<p><img class="aligncenter size-medium wp-image-7569" src="/wp-content/uploads/evolveum-iga-halloween-2025-blog-post-picture.png" alt="Evolveum MidPoint IGA Halloween 2025"/></p>
<p>The post <a rel="nofollow" href="https://evolveum.com/halloween-iga-horror-story-2025/">Halloween IGA Horror Story: AI Unleashed and Zero Trust Gone Mad</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://evolveum.com/halloween-iga-horror-story-2025/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Policies and Rules in MidPoint</title>
		<link>https://evolveum.com/policies-and-rules-in-midpoint/</link>
					<comments>https://evolveum.com/policies-and-rules-in-midpoint/#respond</comments>
		
		<dc:creator><![CDATA[Radovan Semancik]]></dc:creator>
		<pubDate>Tue, 30 Sep 2025 12:05:33 +0000</pubDate>
				<category><![CDATA[Latest news]]></category>
		<category><![CDATA[Other]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[regulations]]></category>
		<category><![CDATA[webinar]]></category>
		<guid isPermaLink="false">https://evolveum.com/?p=13123</guid>

					<description><![CDATA[<p>MidPoint is an identity governance and administration platform. While identity administration is the foundation of the identity industry, it is the governance part which brings business value. Policies and rules are the lifeblood of identity governance. Therefore, our first autumn webinar focuses on them. Identity governance is all about bridging two worlds that are notoriously <a href="https://evolveum.com/policies-and-rules-in-midpoint/" rel="nofollow"><span class="sr-only">Read more about Policies and Rules in MidPoint</span>[&#8230;]</a></p>
<p>The post <a rel="nofollow" href="https://evolveum.com/policies-and-rules-in-midpoint/">Policies and Rules in MidPoint</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>MidPoint is an identity governance and administration platform. While identity administration is the foundation of the identity industry, it is the governance part which brings business value. Policies and rules are the lifeblood of identity governance. Therefore, our first autumn webinar focuses on them.<span id="more-13123"></span></p>
<p>Identity governance is all about bridging two worlds that are notoriously difficult to align: <i>business</i> and <i>IT/cybersecurity</i>. As <i>policies</i> are the basic building block of governance (and cybersecurity), midPoint policies need to have two faces. On the outside, the policies speak business language. On the inside, they contain specific implementation provided by <i>policy rules</i>.</p>
<p>The webinar provided a demonstration of this concept by using policies pre-configured in the upcoming midPoint 4.10. The demo showed the business side of the policies, while the rest of the webinar explained the inner implementation.</p>
<p>Watch the webinar recording or take a look at the <a href="https://docs.evolveum.com/talks/files/2025-09-policies-and-rules-in-midpoint.pdf" rel="noopener" target="_blank">webinar presentation</a>.</p>
<p style="text-align: center;">
<iframe loading="lazy" title="Policies and Rules in MidPoint Webinar" width="640" height="360" src="https://www.youtube.com/embed/RyPPiY4_690?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Policies and policy rules can be used to support regulatory compliance automation and <a href="https://docs.evolveum.com/midpoint/reference/master/admin-gui/dashboards/compliance-dashboard/#continuous-auditing" target="_blank" rel="noopener noreferrer">continuous auditing</a>. The configuration provided in midPoint 4.10 is mostly just a start. There is a lot of potential that can be addressed by custom configuration and development in future midPoint releases.</p>
<p>The post <a rel="nofollow" href="https://evolveum.com/policies-and-rules-in-midpoint/">Policies and Rules in MidPoint</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://evolveum.com/policies-and-rules-in-midpoint/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>MidPoint Adopting EUPL</title>
		<link>https://evolveum.com/midpoint-adopting-eupl/</link>
					<comments>https://evolveum.com/midpoint-adopting-eupl/#respond</comments>
		
		<dc:creator><![CDATA[Radovan Semancik]]></dc:creator>
		<pubDate>Tue, 16 Sep 2025 10:49:06 +0000</pubDate>
				<category><![CDATA[Community]]></category>
		<category><![CDATA[Latest news]]></category>
		<category><![CDATA[eupl]]></category>
		<category><![CDATA[licence]]></category>
		<guid isPermaLink="false">https://evolveum.com/?p=12958</guid>

					<description><![CDATA[<p>Transparency and strong support for the open source community are at the core of midPoint’s approach. To reinforce this commitment while ensuring compliance with key EU laws like cyber resilience and product liability, from version 4.10 midPoint is licensed exclusively under the EUPL. Back in 2011, midPoint was originally released under the terms of the <a href="https://evolveum.com/midpoint-adopting-eupl/" rel="nofollow"><span class="sr-only">Read more about MidPoint Adopting EUPL</span>[&#8230;]</a></p>
<p>The post <a rel="nofollow" href="https://evolveum.com/midpoint-adopting-eupl/">MidPoint Adopting EUPL</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Transparency and strong support for the open source community are at the core of midPoint’s approach. To reinforce this commitment while ensuring compliance with key EU laws like cyber resilience and product liability, from version 4.10 midPoint is licensed exclusively under the EUPL.<span id="more-12958"></span></p>
<p>Back in 2011, midPoint was originally released under the terms of the Apache License. When the midPoint project started, we looked for a very liberal and modern open source license. Therefore, the Apache License was a natural choice. As the midPoint project matured, we started to realize that the Apache License may have some drawbacks. It is an excellent license in its own right. However, the world was a different place when the license was created, not accounting for cloud and other forms of software deployments. Moreover, the Apache License was created with respect to U.S. legislation. On the other hand, Evolveum is based in and owned in Europe, all midPoint core developers live in Europe, many of our customers are in Europe, and the midPoint project received funding from the European Union in the course of several projects. Therefore, we got the feeling that a US-centric license was no longer a good fit for midPoint. That is why we added the EUPL license to the project in 2019. MidPoint 4.0 was released as dual-licensed software, using both the Apache License and the EUPL. While this approach worked for some time, dual-licensing brings its own set of problems. Therefore, we have decided to complete the transition and use EUPL licensing only, starting with midPoint 4.10.</p>
<p>The European Union Public License (EUPL) is a modern open source license created by the European Commission with the specific goal of fitting into the European legislative framework. It is a very unique license in that respect. It is the first license created and maintained by an international government body. Its very nature guarantees full compliance with European legislation, including new legislative acts such as the Cyber Resilience Act (CRA), which makes the EUPL a natural choice for midPoint.</p>
<p>The EUPL is a <em>weak copyleft</em> license. The copyleft nature of EUPL supports the wider open source community, as anyone who modifies midPoint must release the modifications back to the community. However, copylefting is not viral. MidPoint can still be incorporated into bigger projects without any obligations to license those projects under the EUPL. Moreover, the EUPL is explicitly compatible with other open source licenses. The EUPL also covers new use cases of software, such as the distribution of software as a service (SaaS), making it one of the best open source licenses available today.</p>
<p>We believe that switching to the pure EUPL is the best move to strengthen the open source character of midPoint. Starting with version 4.10, midPoint will be available solely under the EUPL, while the releases 4.8 and 4.9 remain dual-licensed under both the EUPL and the Apache 2.0 License. This change applies only to midPoint itself and does not include connectors or other components. The use of midPoint will be simpler, the open source community will be empowered, and midPoint&#8217;s development and distribution will be fully compliant with European legislation.</p>
<p>The post <a rel="nofollow" href="https://evolveum.com/midpoint-adopting-eupl/">MidPoint Adopting EUPL</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://evolveum.com/midpoint-adopting-eupl/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Experts Weigh In: Preparing for the Future After SAP IDM and Microsoft Identity Manager</title>
		<link>https://evolveum.com/sap-idm-mim-migration-best-practices/</link>
					<comments>https://evolveum.com/sap-idm-mim-migration-best-practices/#respond</comments>
		
		<dc:creator><![CDATA[Mita Chu]]></dc:creator>
		<pubDate>Thu, 11 Sep 2025 11:46:54 +0000</pubDate>
				<category><![CDATA[Evolveum's Identity Management and Governance Blog]]></category>
		<category><![CDATA[Other]]></category>
		<category><![CDATA[identity management]]></category>
		<guid isPermaLink="false">https://evolveum.com/?p=12936</guid>

					<description><![CDATA[<p>Facing the sunset of a critical system is never easy. When it comes to something as fundamental as identity management, such as the end of life for SAP Identity Management (SAP IDM) and Microsoft Identity Manager (MIM), the stakes are even higher. With end-of-life dates looming in 2027 and 2029, many CIOs and CISOs are <a href="https://evolveum.com/sap-idm-mim-migration-best-practices/" rel="nofollow"><span class="sr-only">Read more about Experts Weigh In: Preparing for the Future After SAP IDM and Microsoft Identity Manager</span>[&#8230;]</a></p>
<p>The post <a rel="nofollow" href="https://evolveum.com/sap-idm-mim-migration-best-practices/">Experts Weigh In: Preparing for the Future After SAP IDM and Microsoft Identity Manager</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Facing the sunset of a critical system is never easy. When it comes to something as fundamental as identity management, such as the end of life for SAP Identity Management (SAP IDM) and Microsoft Identity Manager (MIM), the stakes are even higher. With end-of-life dates looming in 2027 and 2029, many CIOs and CISOs are navigating a complex landscape of migration decisions.</p>
<p>To help you prepare, we&#8217;ve compiled a <a href="https://evolveum.com/sap-idm-mim-how-to-plan-your-identity-migration/"><b>detailed guide for your migration</b></a> and spoken with leading identity management partners who have guided hundreds of organizations through these critical transitions. Our goal is to help you understand the strategic implications, execution challenges, and selection criteria that matter most to executive decision-makers.</p>
<p><i>The insights in this article come from Evolveum partners, including Ventum, ACEN, IT Concepts, Unicon, Zephon, Innovery, DAASI International, ISSP, Qriar, and Identicum – all specialists in enterprise identity management.</i></p>
<h2>Why should organizations start planning their SAP IDM/MIM migration now instead of waiting until closer to the end-of-life dates?</h2>
<p><b>Ventum:</b> Successful migrations don&#8217;t happen overnight – and they definitely don&#8217;t happen smoothly under pressure. Starting now gives your organization breathing room to plan strategically rather than reactively. Waiting too long introduces serious risks: resource bottlenecks, rushed decisions, and rising costs. By acting now, you&#8217;re not just avoiding risk, you&#8217;re also giving your team the opportunity to modernize processes, align with new security standards, and choose a platform that fits future needs, not just today&#8217;s.</p>
<p><img loading="lazy" class="wp-image-12950 alignright" src="https://evolveum.com/wp-content/uploads/evolveum-partner-quote-1-300x200.png" alt="" width="213" height="142" srcset="https://evolveum.com/wp-content/uploads/evolveum-partner-quote-1-300x200.png 300w, https://evolveum.com/wp-content/uploads/evolveum-partner-quote-1-1024x683.png 1024w, https://evolveum.com/wp-content/uploads/evolveum-partner-quote-1-768x512.png 768w, https://evolveum.com/wp-content/uploads/evolveum-partner-quote-1-750x500.png 750w, https://evolveum.com/wp-content/uploads/evolveum-partner-quote-1-600x400.png 600w, https://evolveum.com/wp-content/uploads/evolveum-partner-quote-1.png 1200w" sizes="(max-width: 213px) 100vw, 213px" /></p>
<p><b>ACEN</b>: Think capacity planning. If you need expertise for 2026-2028 roll-outs, professional talent will already be engaged with organizations that planned their migration early. These legacy platforms won&#8217;t get extended; they&#8217;re antithetical to SAP and Microsoft&#8217;s cloud-first future.</p>
<p><b>ITConcepts:</b> IAM projects are more complex than they appear at first, often involving multiple stakeholders, legacy integrations, and unclear requirements. Early engineering requirements and a thorough analysis of your current architecture are essential to ensure you have enough time for implementation, testing, and training. Delaying this increases the risk of rushed decisions and operational issues.</p>
<p><b>Unicon:</b> Identity systems are deeply integrated into nearly every aspect of business operations. Often, only identity management teams fully understand how critical these systems are to daily functionality, yet IT teams are already stretched thin. Starting early gives you time to build a realistic roadmap, allocate resources effectively, and minimize disruption.</p>
<p><b>Zephon:</b> Microsoft has not invested in MIM for years, and it is reflected in the product architecture. It is old, cumbersome, and difficult to install, manage, and maintain. You are likely spending more to maintain it than you would to replace it. Since migrations can take a year or more, it’s best to start planning now.</p>
<h2>What&#8217;s the most effective strategy for executing a successful migration from legacy IDM platforms?</h2>
<p><b>Neverhack:</b> Update documentation and clarify goals before starting. Don&#8217;t begin until objectives are crystal clear to avoid project risks, delays, and cost overruns. Avoid a one-step migration; instead, analyze the best approach and break it up into multiple steps.</p>
<p><b>DAASI International</b>: While &#8220;Big Bang&#8221; migrations might seem faster, in our experience, a slow migration from one product to the other is always better. This can be done by configuring the old system as a source for the new one, allowing you to migrate connected systems one by one. This gives you more time for testing and allows for temporary rollbacks if errors occur. This step-by-step approach also allows for migrating different user types in different stages, such as migrating staff first and then students. It is essential to work on test systems first and only proceed with the productive migration after all requirements are met.</p>
<p><b>ACEN</b>: The most critical factor is having the entire organization, including senior management, convinced of the necessity and benefits of implementing a modern IGA solution. Often, these projects are started by IT or security teams without broader organizational buy-in, leading to more time spent justifying the program than delivering results. Thorough preparation is key; implementation should only begin once there is clear alignment on priorities, well-understood requirements, and a shared vision for digital identity lifecycle processes.</p>
<p><b>ISSP</b>: Avoid the &#8216;just move it over&#8217; trap – legacy systems have years of ad hoc logic and dormant accounts that should be audited first. Don&#8217;t over-engineer instead of delivering a minimum viable product (MVP); trying to build the perfect end-state from day one can lead to delays and user fatigue. A better approach is to start with an MVP that provides immediate value and can be expanded iteratively. Celebrate small wins, which often start with getting the core right by redesigning roles and policies based on a proper audit.</p>
<p><b>Ventum</b>: Engage both IT and business stakeholders early &#8211; IAM affects security, compliance, and user experience, not just IT operations. Avoid the &#8216;lift and shift&#8217; legacy logic, as this creates unnecessary complexity without delivering new value.</p>
<h2>What key considerations should organizations keep in mind when selecting a replacement for SAP IDM or Microsoft Identity Manager?</h2>
<p><b>Qriar:</b> Choose a solution that supports both the identity lifecycle and governance with identity standards like SCIM for easy integrations. Look for scalability without heavy upfront investment and an API-first architecture to support future identity fabric concepts.</p>
<p><b>Ventum:</b> Don’t replicate the past &#8211; define future needs and leverage modern capabilities like policy-based access, analytics, and zero trust. Ensure integration with HR, directories, and cloud platforms, and build in governance for regulations like GDPR and NIS2.</p>
<p><b>ACEN:</b> Prioritize future-proof architecture supporting hybrid/multi-cloud environments. Choose modular, extensible platforms with API-first approaches and flexible licensing models based on actual usage rather than upfront commitments.</p>
<p><b>Unicon:</b> Start with a clear understanding of your specific needs – avoid overly complex systems if they are unnecessary. Understand the full financial commitment, including the total cost of ownership, and ensure realistic transition planning that matches your organizational capacity.</p>
<p><b>DAASI International:</b> The next step is to find a product on the market that best meets these requirements, remembering that with open source projects, you always have the option to have needed features implemented.</p>
<p><b>Identicum:</b> Consider the integration capabilities with existing and legacy systems, vendor support, and licensing costs. It is also critical to assess the vendor&#8217;s long-term strategy, ensuring the product has a clear, public roadmap that aligns with your organization&#8217;s future needs and that the vendor is committed to ongoing development and support.</p>
<div class="midpoint-cta-block" style="background-color: #9dc2e6; padding: 12px 3%; border-radius: 8px; width: 100%; color: white; box-shadow: 0 3px 8px rgba(0,0,0,0.1); display: flex; align-items: center; gap: 20px; box-sizing: border-box; margin: 20px 0;">
<div style="display: flex; align-items: center;"><img style="width: 70px; height: 70px; border-radius: 50%; object-fit: cover; background: white; padding: 6px;" src="https://evolveum.com/wp-content/uploads/midpoint-circle-logo.png" alt="midPoint logo" /></div>
<div style="height: 70px; border-left: 2px solid white; margin: 0 20px;"></div>
<div style="flex: 1;">
<p style="margin: 0; font-size: 16px;">Move away from legacy identity management and discover the power of open source IGA.</p>
<p style="margin: 0; font-size: 16px;"><a style="color: white; font-weight: bold; text-decoration: underline;" href="https://evolveum.com/midpoint/" target="_blank" rel="noopener">Explore midPoint.</a></p>
</div>
</div>
<h2>Key takeaways for successful migrations</h2>
<p>The insights from these identity management experts reveal several critical considerations for CIOs and CISOs:</p>
<p><b>Help might not always be available later on:</b> The window for securing experienced migration expertise is narrowing rapidly. Organizations that delay may find themselves competing for limited talent pools as the sunset dates approach.</p>
<p><b>The end of one thing is the beginning of a new (modern) opportunity:</b> This forced migration presents a rare chance to eliminate technical debt and align your identity processes with modern principles, be it zero trust, identity analytics or support of hybrid and multi-cloud environments. However, this is only true for organizations that give themselves enough time to approach it strategically rather than reactively.</p>
<p><b>Success depends on everyone: </b>Success depends heavily on executive agreement and cross-functional alignment. Identity migrations touch every part of the organization, making them as much about change management as technology implementation.</p>
<p><b>Staying might become more expensive: </b>For many organizations, the total cost of maintaining legacy systems now exceeds the investment required for modern alternatives, making this migration both necessary and economically advantageous.</p>
<p>The consensus is clear: organizations that begin planning now will migrate strategically with adequate resources and time for proper testing. Those who wait will find themselves managing crisis migrations under pressure, with limited options and inflated costs.</p>
<p>The question isn&#8217;t whether to migrate, but whether to plan ahead or wait until circumstances force your hand. The window for strategic action is open, but it won&#8217;t remain so indefinitely.</p>
<h2>About our experts</h2>
<p>The insights in this article come from leading identity management specialists who have collectively guided hundreds of enterprise migrations:</p>
<ul>
<li><a href="https://evolveum.com/partners/ventum/" target="_blank" rel="noopener">Ventum</a> &#8211; With a team of over 170 professionals across Austria, Germany, Switzerland and Poland, Ventum combines diverse expertise to tackle the most complex security challenges.</li>
<li><a href="https://evolveum.com/partners/acen/" target="_blank" rel="noopener">ACEN</a> &#8211; ACEN is a top-notch provider for complete solutions of cyber security in Belgium, which ensures that companies from various fields are protected against any possible threats coming from the internet.</li>
<li><a href="https://evolveum.com/partners/ITConcepts/" target="_blank" rel="noopener">ITConcepts</a> &#8211; ITConcepts, based in Switzerland, is a leading provider of 360° solutions for automating business processes, with expertise in IAM, IT security, and more.</li>
<li><a href="https://evolveum.com/partners/unicon/" target="_blank" rel="noopener">Unicon</a> – Unicon is a leading US provider of IT consulting and support for education technology, specializing in using open-source technologies to deliver cost-effective IAM solutions.</li>
<li><a href="https://evolveum.com/partners/zephon/" target="_blank" rel="noopener">Zephon</a> – Zephon is an American boutique cybersecurity consultancy and managed security services provider that helps businesses maximize their cyber investments through simplification, consolidation, and automation.</li>
<li><a href="https://evolveum.com/partners/neverhack/">Neverhack</a> &#8211; Neverhack is a French group that has been specializing in cybersecurity for over 40 years. Operating in 10 countries, the company&#8217;s ambition is to build a secure digital world for all.</li>
<li><a href="https://evolveum.com/partners/daasi-international/" target="_blank" rel="noopener">DAASI International</a> &#8211; DAASI International is one of the leading German providers for open source software in the areas of federated Identity &amp; Access Management as well as digital humanities.</li>
<li><a href="https://evolveum.com/partners/issp/" target="_blank" rel="noopener">ISSP</a> &#8211; ISSP is a group of companies specializing in cybersecurity and data management solutions, managed security services, and professional training that operates in Ukraine, Georgia, Kazakhstan, Poland and Canada.</li>
<li>Qriar – Qriar is a cybersecurity company wit a presence in Brazil, USA and UAE,  that focuses on turning security into a competitive advantage by providing the right people with the right information at the right time.</li>
<li><a href="https://evolveum.com/partners/identicum/" target="_blank" rel="noopener">Identicum</a> &#8211; Since 2005, Identicum has been a professional services company that is focused on Identity and Access Management projects in Latin America and the USA.</li>
</ul>
<p>The post <a rel="nofollow" href="https://evolveum.com/sap-idm-mim-migration-best-practices/">Experts Weigh In: Preparing for the Future After SAP IDM and Microsoft Identity Manager</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://evolveum.com/sap-idm-mim-migration-best-practices/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>MidPilot Project: Milestone 1 Progress Report</title>
		<link>https://evolveum.com/midpilot-project-milestone-1-progress-report/</link>
					<comments>https://evolveum.com/midpilot-project-milestone-1-progress-report/#respond</comments>
		
		<dc:creator><![CDATA[Katka Bolemant]]></dc:creator>
		<pubDate>Tue, 12 Aug 2025 15:06:00 +0000</pubDate>
				<category><![CDATA[Development]]></category>
		<category><![CDATA[midPilot]]></category>
		<guid isPermaLink="false">https://evolveum.com/?p=12836</guid>

					<description><![CDATA[<p>At the end of June, we successfully completed the first milestone of the midPilot project, funded by the European Union’s Recovery and Resilience Plan. This milestone, running from April to June 2025, focused primarily on research and analysis of the current state, combined with a series of experiments, measurements, and prototype developments. These activities laid <a href="https://evolveum.com/midpilot-project-milestone-1-progress-report/" rel="nofollow"><span class="sr-only">Read more about MidPilot Project: Milestone 1 Progress Report</span>[&#8230;]</a></p>
<p>The post <a rel="nofollow" href="https://evolveum.com/midpilot-project-milestone-1-progress-report/">MidPilot Project: Milestone 1 Progress Report</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>At the end of June, we successfully completed the first milestone of the <a href="https://docs.evolveum.com/midpoint/projects/midPilot/" target="_blank" rel="noopener">midPilot project</a>, funded by the European Union’s Recovery and Resilience Plan. This milestone, running from April to June 2025, focused primarily on research and analysis of the current state, combined with a series of experiments, measurements, and prototype developments. These activities laid the groundwork for the first version of the project’s architecture and design. A detailed summary of our findings and outcomes is available in the <a href="https://docs.evolveum.com/midpoint/projects/midPilot/resources/milestone1-report.pdf" target="_blank" rel="noopener">published milestone report</a> and concluded in the following sections.</p>
<h2>Research, Analysis, and Prototypes Scope</h2>
<p>The main focus was to explore how AI can enhance midPoint’s capabilities, particularly in the areas of connector code generation, mapping recommendations, and correlation logic. We started with research in state-of-the-art AI technologies, including Large Language Models (LLMs) and other AI/ML techniques, to identify their potential applications in midPoint. Since the midPilot project scope is quite broad, the research and analysis included areas for scraping, data extraction, and data transformation, as well as the use of AI in code generation and recommendations for configuration. Based on research findings, we conducted a series of experiments and measurements to evaluate the feasibility and effectiveness of various AI techniques in these areas. We also developed several prototypes to validate our ideas and approaches, including a connector code generator, a model-mapping recommendation system, and a correlation recommendation system. The results of these experiments and prototypes are documented in the <a href="https://docs.evolveum.com/midpoint/projects/midPilot/resources/milestone1-report.pdf" target="_blank" rel="noopener">milestone report</a>, which provides a comprehensive overview of our findings and outcomes.</p>
<p>In addition to prototyping and exploring state-of-the-art AI technologies, we also dedicated time to analyzing and designing changes for midPoint, midPoint Studio, and the Connector Framework (ConnId) itself. We focused not only on the integration capabilities for AI but also on the overall usability and user experience of midPoint, including the design of web-based wizards and an IntelliJ IDEA Studio plugin. These results are also described in the <a href="https://docs.evolveum.com/midpoint/projects/midPilot/resources/milestone1-report.pdf" target="_blank" rel="noopener">milestone report</a>.</p>
<p>Our next steps are to validate the results from Milestone 1 and prepare a minimum viable product (MVP) to test how all the components work together in practice.</p>
<h2>Challenges &#8211; and How You Can Help</h2>
<p>During our experiments, we encountered a challenge related to limited access to real-world configuration data. While we have some publicly available configurations from our mailing list and support portal, more diverse and representative data would make our experiments and algorithms more effective. If you are willing to share your configurations, please send them to <a href="mailto:aidata@evolveum.com">aidata@evolveum.com</a>. We do not require sensitive or production data. It would be an ideal situation if we had such real-world data from the real environment, but we understand that in the space of IGA it means sharing sensitive data. Therefore, we are asking for configurations that do not contain sensitive information. The approach we’ll take is to generate synthetic data based on the configurations you provide. The most valuable inputs are:</p>
<ul>
<li>Resource configurations: mainly the schemaHandling part, including configuration for mappings, synchronization, correlation, and associations.</li>
<li>Optional: roles, policies, objectTemplates, or at least the mappings you use in your environment.</li>
</ul>
<p>This data will not be used for AI training, but solely for analysis, to better understand typical real-world setups. If you have any questions or concerns about sharing your configurations, please feel free to reach out to us at <a href="mailto:aidata@evolveum.com">aidata@evolveum.com</a>.</p>
<h2>Why Your Contribution Matters</h2>
<p>Having access to more configuration examples would allow us to:</p>
<ul>
<li>Identify common patterns in scripts and mappings, and integrate them directly into midPoint.</li>
<li>Replace repetitive Groovy scripts with built-in functions for declarative configuration.</li>
<li>Adjust default behaviors based on frequently used synchronization settings, speeding up onboarding.</li>
<li>Detect complex, recurring solutions that could inspire new midPoint features.</li>
<li>Develop heuristic algorithms to guide users in navigating and configuring their environments more effectively.</li>
</ul>
<p>All with one aim &#8211; to streamline the integration process and improve the overall user experience in midPoint. Therefore, your contributions could directly influence the usability, efficiency, and capabilities of future midPoint versions.</p>
<h2>Publicly Available Resources</h2>
<p>One of the key outcomes of this milestone is the open source <a href="https://github.com/Evolveum/connector-scimrest" target="_blank" rel="noopener">no-code/low-code connector framework</a>, designed to create connectors for cloud applications offering either a REST API or SCIM 2 interface. The framework is already available in our GitHub repository. In its current version, it supports basic operations such as reading objects from an application. Additional capabilities &#8211; including creating, updating, and deleting objects &#8211; will follow in future iterations.</p>
<p>This framework will serve as one option for building new connectors in midPoint, potentially with AI assistance. However, it can also be used without AI, providing a long-term solution for developing custom connectors in both current and future midPoint versions.</p>
<h2>Conclusion and Next Steps</h2>
<p>Milestone 1 has given us a strong foundation. With the new connector framework in place and comprehensive research conducted, we are moving towards Milestone 2. Internally, we decided to divide this milestone into two phases, starting with the MVP to bring all the pieces together.</p>
<p></br></p>
<p style="text-align: center;">This project has received funding from the European Union through the Recovery and Resilience Plan of the Slovak Republic.</p>
<style>
  @media (max-width: 600px) {<br />
    .vertical-separator {<br />
      display: none;<br />
    }<br />
  }<br />
</style>
<div style="text-align: center; margin-top: 40px;">
<hr style="border: none; border-top: 1px solid #2a2768; width: 100%; margin: 0 0 20px 0;" />
<div style="display: flex; justify-content: center; align-items: center; flex-wrap: wrap; gap: 40px; margin-bottom: 20px;">
<div style="display: flex; align-items: center;"><a style="display: flex; align-items: center;" href="https://next-generation-eu.europa.eu/" target="_blank" rel="noopener"><br />
<img style="height: 80px; width: auto; object-fit: contain; display: block;" src="https://evolveum.com/wp-content/uploads/funded-by-the-eu-next-generation-logo.png" alt="Funded by the Next Generation EU" /><br />
</a></div>
<div class="vertical-separator" style="width: 1px; height: 100px; background-color: #2a2768;"></div>
<div style="display: flex; align-items: center;"><a style="display: flex; align-items: center;" href="https://www.planobnovy.sk/" target="_blank" rel="noopener"><br />
<img style="height: 80px; width: auto; object-fit: contain; display: block;" src="https://evolveum.com/wp-content/uploads/recovery-and-resilience-plan-logo.png" alt="Recovery and Resilience Plan" /><br />
</a></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://evolveum.com/midpilot-project-milestone-1-progress-report/">MidPilot Project: Milestone 1 Progress Report</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://evolveum.com/midpilot-project-milestone-1-progress-report/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>SAP IDM &#038; MIM End-of-Life: How to Plan Your Identity Migration</title>
		<link>https://evolveum.com/sap-idm-mim-how-to-plan-your-identity-migration/</link>
					<comments>https://evolveum.com/sap-idm-mim-how-to-plan-your-identity-migration/#respond</comments>
		
		<dc:creator><![CDATA[Evolveum]]></dc:creator>
		<pubDate>Thu, 07 Aug 2025 12:00:17 +0000</pubDate>
				<category><![CDATA[Deployment]]></category>
		<category><![CDATA[Evolveum's Identity Management and Governance Blog]]></category>
		<category><![CDATA[identity management]]></category>
		<guid isPermaLink="false">https://evolveum.com/?p=12627</guid>

					<description><![CDATA[<p>For enterprises built on SAP Identity Management (SAP IDM) and Microsoft Identity Manager (MIM), the next few years will bring unavoidable change. Two of the last widely adopted on-prem platforms in enterprise environments are heading toward end-of-life. The end-of-life of SAP IDM and MIM SAP Identity Management mainstream maintenance ends on December 31, 2027, with <a href="https://evolveum.com/sap-idm-mim-how-to-plan-your-identity-migration/" rel="nofollow"><span class="sr-only">Read more about SAP IDM &#038; MIM End-of-Life: How to Plan Your Identity Migration</span>[&#8230;]</a></p>
<p>The post <a rel="nofollow" href="https://evolveum.com/sap-idm-mim-how-to-plan-your-identity-migration/">SAP IDM &#038; MIM End-of-Life: How to Plan Your Identity Migration</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>For enterprises built on SAP Identity Management (SAP IDM) and Microsoft Identity Manager (MIM), the next few years will bring unavoidable change. Two of the last widely adopted on-prem platforms in enterprise environments are heading toward end-of-life.</p>
<h2>The end-of-life of SAP IDM and MIM</h2>
<p><strong>SAP Identity Management</strong> mainstream maintenance ends <a href="https://community.sap.com/t5/technology-blog-posts-by-sap/preparing-for-sap-identity-management-s-end-of-maintenance-in-2027/ba-p/13596101" target="_blank" rel="noopener"><b>on December 31, 2027</b></a>, with extended maintenance available until 2030. This date might seem far off, but anyone who&#8217;s been through a major identity system migration knows how quickly time flies when you&#8217;re dealing with complex integrations, data migrations, and user training.</p>
<p><strong>Microsoft Identity Manager</strong> support was extended to <a href="https://learn.microsoft.com/en-us/lifecycle/products/microsoft-identity-manager-2016" target="_blank" rel="noopener"><b>January 9, 2029</b></a>. However, Microsoft stopped actively developing MIM in 2021, focusing instead on Entra ID (formerly Azure AD). The message is clear: their priority is no longer on-premise identity solutions.</p>
<p>For many organizations, this marks the end of an era – and the beginning of a significant challenge. For those navigating strict data sovereignty requirements or committed to maintaining critical on-prem capabilities, the road ahead may be even more complex. However, there is light at the end of the tunnel. After years of stagnant feature development, most current SAP IDM and MIM environments are outdated, lacking modern identity governance capabilities. Now is the perfect time to rethink your identity infrastructure and modernize your identity security posture.</p>
<p>In the following sections, we will explore practical strategies for legacy identity system migration and outline key options available to ensure a smooth, secure, and future-proof transition.</p>
<h2>When the obvious choice isn’t always the right one</h2>
<p>When legacy systems reach end-of-life, the natural path often leads to vendor-recommended successors. SAP and Microsoft have developed clear migration guidance toward their cloud-based alternatives: <a href="https://help.sap.com/docs/IDENTITY_AUTHENTICATION?locale=en-US" target="_blank" rel="noopener"><b>SAP Cloud Identity Services and SAP Cloud Identity Access Governance</b></a> for identity and access management into SAP products and <a href="https://www.microsoft.com/en-us/security/business/identity-access/microsoft-entra-id" target="_blank" rel="noopener"><b>Microsoft Entra ID</b></a>.</p>
<p>These solutions offer compelling advantages – modern cloud architecture, reduced infrastructure overhead, and tight integration within existing vendor ecosystems. For organizations heavily invested in Microsoft or SAP technologies, this path provides obvious benefits.</p>
<p>However, <strong>neither Entra ID nor SAP Cloud Identity Services represents a direct replacement</strong> for their on-premise predecessors. They differ in architecture, features, and how they operate, which means they might not fit every organization’s needs.</p>
<p>Before jumping on the bandwagon, ask yourself:</p>
<ul>
<li>Is Microsoft or SAP at the core of your tech stack, and are you planning to stay within a single-vendor architecture? Or are you operating in a more complex, multi-vendor ecosystem?</li>
<li>Will your architecture remain on-premise, migrate to the cloud, or maintain hybrid operations?</li>
<li>How complex are your identity governance and administration needs beyond basic user lifecycle management?</li>
<li>What are your future scalability, security, and compliance needs?</li>
</ul>
<h3>Hybrid achitecture adds complexity</h3>
<p>Most large organizations run hybrid environments with a mix of on-premise and cloud systems. Within these environments, managing identity and access consistently can be challenging. Microsoft talks about Entra ID as a hybrid solution, and in many ways it is. But the reality of making it work smoothly across all your systems can be more challenging than initial assessments suggest.</p>
<p>Managing identities in a hybrid IT architecture is not always straightforward. Organizations commonly run into:</p>
<ul>
<li><strong>Identity synchronization challenges</strong> across forests and domains</li>
<li><strong>Custom attributes</strong> that don’t cleanly map to cloud directories that break in modern policy frameworks</li>
<li><strong>Firewalls and proxies</strong> that impede cloud-to-ground communication in apps not designed for modern protocols</li>
</ul>
<p>Hybrid identity architecture can add complexity. For many organizations, it offers the necessary balance to maintain compliance and customization without compromising long-term transition potential. The good news is that with identity platforms <strong>purpose-built to handle hybrid environments,</strong> these complexities can be effectively managed.</p>
<h3>Cloud-first isn’t for everyone</h3>
<p>Amid the push toward cloud migrations, it’s important not to overlook that many organizations choose to keep their operations on-premises. In such cases, adopting a cloud-native identity platform like Entra ID may not make much sense.</p>
<p>While some vendors are scaling back support for on-prem identity solutions, that doesn’t mean on-prem architecture is obsolete. In fact, many enterprises, including large global ones, continue to rely on it, often due to cost, strict regulatory compliance, and the need for full control over infrastructure and operations. If your organization falls into this category, that’s a valid and strategic choice.</p>
<p>That doesn’t mean your options are limited, though – there are still modern platforms that not only work in the cloud, but also fully support on-prem deployments and are committed to continuing that support.</p>
<h3>Integration and customization challenges</h3>
<p>This is where many organizations get surprised. If you&#8217;ve spent years building custom workflows, approval processes, and business rules in SAP IDM or MIM, you might find that <strong>Entra ID doesn&#8217;t give you the same level of flexibility.</strong></p>
<p>Microsoft has built a solid platform, but it&#8217;s designed to work optimally within a Microsoft environment. If your business processes don&#8217;t align with that approach, you&#8217;ll need to either change your processes or find workarounds that add complexity and cost.</p>
<h3>The true cost of migration</h3>
<p>Per-user pricing models appear straightforward during initial evaluations, especially for smaller organizations. But enterprise-scale implementations frequently involve premium features, additional connectors for non-vendor systems, custom development requirements, licensing fees, and subscription costs that significantly impact long-term budgets.</p>
<h2>The CISO’s strategic migration playbook</h2>
<p>Successfully migrating from legacy platforms requires a comprehensive approach that balances strategic planning with practical, risk-aware execution.</p>
<p>Organizations should <strong>begin this process well in advance of sunset dates</strong>, as identity system migrations typically require 12-36 months for full implementation in enterprise environments. Simply defining requirements and selecting the right solutions can take several months. Those who delay risk security vulnerabilities, operational disruptions, and compliance issues. That said, with the right tools and approach, you can have a steady stream of initial results from the beginning of the migration process.</p>
<p>Here’s a high-level roadmap to help you navigate this transition successfully:</p>
<p><img class="aligncenter wp-image-12634 size-full" src="/wp-content/uploads/evolveum-migration-from-sap-idm-and-mim-timeline.png" alt="Evolveum - The ideal identity management migration timeline" width="700" /></p>
<h3>1. Assess your current identity landscape</h3>
<p>Start with a thorough inventory of your existing identity infrastructure. <strong>Document not just your systems and integrations, but the actual business processes they support.</strong> Often, organizations discover that their identity management has evolved far beyond its original design, with workarounds and customizations that aren&#8217;t immediately obvious.</p>
<p>At this stage:</p>
<ul>
<li>Review your systems, target directories, and applications, making sure to compare data for inconsistencies</li>
<li>Map how your identity systems connect with other applications</li>
<li>Understand existing identity lifecycle triggers, provisioning flows, and access policies</li>
<li>Take an inventory of non-human identities, such as service accounts, API credentials, and other machine identities</li>
</ul>
<p>Also, map your <a href="https://evolveum.com/regulatory-compliance-with-midpoint/" target="_blank" rel="noopener">compliance requirements</a> early in the process. Different solutions handle regulatory requirements differently, and understanding these constraints upfront prevents costly discoveries later in the migration.</p>
<p>💡 <strong>Best Practice</strong>: Take this opportunity to &#8220;clean house&#8221;. Review your current licenses, identify which tools and capabilities are truly necessary, and pinpoint under-utilized applications. You might find significant savings by removing unused licenses and consolidating your tools.</p>
<h3>2. Define your requirements</h3>
<p>Engage stakeholders across IT, security, and business units to understand their actual needs and requirements. <strong>Focus on business outcomes</strong> rather than technical feature translations. This approach often reveals opportunities to streamline processes during the migration.</p>
<p>Consider your organization&#8217;s five to ten-year trajectory:</p>
<ul>
<li>How complex do you anticipate your identity needs to be?</li>
<li>How will your identity governance requirements grow?</li>
<li>Are there any emerging regulations or compliance requirements that will have an impact on your identity processes?</li>
<li>How will your tech stack grow and what integration capabilities will you need?</li>
<li>Are you planning to expand internationally?</li>
<li>What about future mergers or acquisitions?</li>
</ul>
<p>These factors should guide you in selecting the right solution to support your needs for years to come.</p>
<p>💡 <strong>Best Practice</strong>: Keep the initial scope focused and achievable. Successful teams often start with a core domain, like workforce identity lifecycle management, and build outward in manageable iterations. This allows for early value delivery and room for lessons learned to inform future phases.</p>
<h3>3. Evaluate solutions through a security lens</h3>
<p>Evaluation processes should extend well beyond feature comparisons and vendor demos. This includes assessing integration capabilities with existing systems, evaluating performance under realistic load conditions, and understanding true customization flexibility, while prioritizing security controls.</p>
<ul>
<li><strong>Authentication and credential security:</strong> Assess credential storage encryption, supported authentication methods, and multi-factor authentication enforcement capabilities. Examine password policies and session management.</li>
<li><strong>Audit and compliance capabilities:</strong> Verify detailed logging of access decisions, configuration changes, and administrative actions. Confirm log retention periods and export capabilities. Ensure compliance reporting supports your regulatory requirements.</li>
<li><strong>Vulnerability management:</strong> Evaluate security patch frequency, the vendor security track record, and testing procedures, including penetration testing and code reviews. Request vulnerability disclosure timelines and remediation processes.</li>
<li><strong>Data protection and privacy:</strong> Determine data residency locations, processing controls, and personally identifiable information handling procedures. Verify data export, deletion capabilities, and privacy regulation compliance mechanisms.</li>
<li><strong>Technical roadmap and sustainability:</strong> Understand the vendor’s product development plans and strategic vision. Assess whether the solution is actively maintained and evolving to keep pace with emerging security threats, regulatory changes, and technological advancements.</li>
</ul>
<p><strong>💡 Best Practice</strong>: Favor platforms that allow non-disruptive analysis and prototyping. This ensures you can validate the technical fit, policy alignment, and risk exposure before you commit to full deployment.</p>
<h3>4. Build a risk-aware migration plan</h3>
<p>Avoid &#8220;big bang&#8221; migrations. Successful migrations follow<a href="https://evolveum.com/wp-content/uploads/evolveum-case-study-ami-vodafone-czech.pdf" target="_blank" rel="noopener"> phased approaches</a> that balance early insight with controlled execution. While traditional wisdom often suggests starting with non-critical systems, in identity management, it&#8217;s often more effective to connect to foundational, business-critical systems early in a non-invasive, simulation-driven way. This approach provides crucial visibility into your most complex and foundational identity flows without introducing immediate risk. Each migration phase should allow time for:</p>
<ul>
<li>Integration challenges</li>
<li>Refining processes</li>
<li>Validating assumptions before migrating business-critical systems</li>
</ul>
<p>Pilot phases should focus on complex integration scenarios rather than simple ones, revealing potential issues early in the process.</p>
<p><strong>Don’t forget about resource planning either</strong> – these migrations demand significant technical resources and expertise. Resource allocation should account for senior technical staff being significantly engaged with migration activities for extended periods. Assess internal capabilities honestly and plan for external support where needed, including technical implementation support and change management.</p>
<p>Your migration plan should include comprehensive rollback procedures for each phase, strategies for maintaining security during parallel system operations, and clear incident response procedures for migration-related security events.</p>
<p>💡 <strong>Best Practice</strong>: Connect to core systems like AD early in the process using non-disruptive simulations. This gives you visibility into your identity baseline, reveals gaps or legacy issues, and sets the stage for safer phased implementation, allowing you to &#8220;see before you act.&#8221;</p>
<h3>5. Invest in change management and user adoption</h3>
<p>Technical implementation represents only part of your challenge. <strong>Successful migrations require comprehensive change management strategies</strong> beginning with key stakeholder involvement from IT, security, and business units during solution selection to ensure buy-in and realistic expectation setting.</p>
<p>Training programs should reflect actual user workflows rather than theoretical processes. Organizations should plan for different user groups with varying technical skills and interaction patterns. The communication roll out should address concerns proactively, provide clear feedback and support channels, and maintain transparency about timelines and impact expectations.</p>
<p>💡 <strong>Best Practice:</strong> Pair each technical delivery phase with targeted stakeholder communication, user training material development, and clear success measurement. Early small wins, achieved through iterative and low-risk deployments, help establish credibility and build momentum for broader adoption.</p>
<h2>Finding the right replacement for SAP IDM and MIM</h2>
<p><a href="https://docs.evolveum.com/iam/" target="_blank" rel="noopener">The identity and access management</a> (IAM) market has matured considerably in recent years with numerous established and emerging platforms worth serious consideration. While certain recommended routes offer integration advantages, they’re not the only options:</p>
<ul>
<li><strong>Full-featured identity governance platforms:</strong> Vendors focused specifically on identity governance and administration often provide deeper governance capabilities and more flexible customization options than general identity management and lightweight IGA solutions. While light IGAs can be handy, often offering out-of-the-box functionality – they frequently lack the robust features required for comprehensive, long-term governance and scalability.</li>
<li><strong>Hybrid IGA platforms:</strong> Designed to support on-prem, hybrid, and cloud deployment needs. For organizations working in a hybrid operational model or those planning a gradual migration to the cloud, these platforms can be an ideal solution.</li>
<li><strong>Open source software:</strong> Modern <a href="https://evolveum.com/midpoint/" target="_blank" rel="noopener">open-source identity platforms</a> have gained significant enterprise adoption. These solutions now offer enterprise-grade features, professional support options, and active communities that contribute to their ongoing improvement, such as testing, answering community questions, and even developing custom connectors, providing maximum flexibility and customization potential.</li>
</ul>
<p>Evaluate platforms based on your specific architecture and business needs – consider factors beyond brand recognition. It is worth examining community threads to understand real-world scenarios and engaging with companies with similar challenges. Also, ask for proof-of-concepts where possible.</p>
<p>When it comes to cost, think about the total cost of ownership, including licensing fees, implementation costs, ongoing maintenance, training requirements, and potential needs for external expertise.</p>
<div class="midpoint-cta-block" style="background-color: #9dc2e6; padding: 12px 3%; border-radius: 8px; width: 100%; font-family: Roboto, sans-serif; color: white; box-shadow: 0 3px 8px rgba(0,0,0,0.1); display: flex; align-items: center; gap: 20px; box-sizing: border-box;">
<div style="padding-top: 5px; display: flex; align-items: center;"><img style="width: 70px; height: 70px; border-radius: 50%; object-fit: cover; background: white; padding: 6px; flex-shrink: 0;" src="https://evolveum.com/wp-content/uploads/midpoint-circle-logo.png" alt="midPoint logo" /></div>
<div style="height: 70px; border-left: 2px solid white; flex-shrink: 0;"></div>
<div style="text-align: left; display: flex; flex-direction: column; justify-content: center; height: 70px; flex-grow: 1; overflow: hidden;">
<p style="margin: 0; font-size: 16px;">Discover how midPoint&#8217;s open source IGA platform aligns with your unique needs and environment.</p>
<p style="margin: 0; font-size: 16px;"><a style="color: white; font-weight: bold; text-decoration: underline;" href="https://evolveum.com/midpoint/" target="_blank" rel="noopener">Explore midPoint.</a></p>
</div>
</div>
<h2>The Strategic Path Forward That Shapes the Next Decade</h2>
<p>Thousands of organizations affected by the end-of-life of the SAP IDM and MIM now face pivotal decisions about their identity management future. While vendor-recommended migration paths offer predictable routes, they may not represent optimal solutions for every environment. The key lies in approaching these decisions strategically rather than reactively.</p>
<p>Take time to understand options fully – evaluate solutions based on specific requirements rather than general market positioning, and consider long-term implications. Today&#8217;s identity management market offers mature alternatives across different deployment models, architectural approaches, and business models.</p>
<p>Starting evaluation processes early and considering the full spectrum of available solutions will ensure the chosen platforms support long-term organizational objectives. Remember, the decisions made today will impact your identity security operations for the next decade or two.</p>
<p>&nbsp;</p>
<p><img loading="lazy" class="alignleft wp-image-12641" src="https://evolveum.com/wp-content/uploads/evolveum-logo-circle-outline-300x300.png" alt="evolveum identity governance administration logo" width="138" height="138" srcset="https://evolveum.com/wp-content/uploads/evolveum-logo-circle-outline-300x300.png 300w, https://evolveum.com/wp-content/uploads/evolveum-logo-circle-outline-150x150.png 150w, https://evolveum.com/wp-content/uploads/evolveum-logo-circle-outline-250x250.png 250w, https://evolveum.com/wp-content/uploads/evolveum-logo-circle-outline-174x174.png 174w, https://evolveum.com/wp-content/uploads/evolveum-logo-circle-outline-100x100.png 100w, https://evolveum.com/wp-content/uploads/evolveum-logo-circle-outline.png 500w" sizes="(max-width: 138px) 100vw, 138px" /></p>
<p><strong>About Evolveum:</strong><br />
Evolveum is the organization behind midPoint, the leading open source IGA platform recognized as a complete IGA by both Gartner and KuppingerCole. MidPoint bridges the gap between IT and business, making it an ideal choice for organizations seeking digital transformation to enhance security and efficiency.</p>
<p>The post <a rel="nofollow" href="https://evolveum.com/sap-idm-mim-how-to-plan-your-identity-migration/">SAP IDM &#038; MIM End-of-Life: How to Plan Your Identity Migration</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://evolveum.com/sap-idm-mim-how-to-plan-your-identity-migration/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Now Serving: Notification Configuration Training Course</title>
		<link>https://evolveum.com/now-serving-notification-configuration-training-course/</link>
					<comments>https://evolveum.com/now-serving-notification-configuration-training-course/#respond</comments>
		
		<dc:creator><![CDATA[Ivan Noris]]></dc:creator>
		<pubDate>Tue, 15 Jul 2025 12:22:11 +0000</pubDate>
				<category><![CDATA[Community]]></category>
		<category><![CDATA[Evolveum's Identity Management and Governance Blog]]></category>
		<category><![CDATA[midPoint training]]></category>
		<guid isPermaLink="false">https://evolveum.com/?p=12674</guid>

					<description><![CDATA[<p>Earlier this year, we published the Intermediate Configuration training, which completes our MidPoint Foundation Training series. But this is not the end of the training development &#8211; oh no. Behind the curtains, in our training course kitchen, a new course has been prepared. Now it’s leaving the kitchen &#8211; hot and ready to be served. <a href="https://evolveum.com/now-serving-notification-configuration-training-course/" rel="nofollow"><span class="sr-only">Read more about Now Serving: Notification Configuration Training Course</span>[&#8230;]</a></p>
<p>The post <a rel="nofollow" href="https://evolveum.com/now-serving-notification-configuration-training-course/">Now Serving: Notification Configuration Training Course</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Earlier this year, we published the <a href="https://evolveum.com/training-and-certification/midpoint-deployment-intermediate-configuration/">Intermediate Configuration training</a>, which completes our <a href="https://evolveum.com/midpoint-foundation-training-series/">MidPoint Foundation Training series</a>. But this is not the end of the training development &#8211; oh no.</p>
<p>Behind the curtains, in our training course kitchen, a new course has been prepared. Now it’s leaving the kitchen &#8211; hot and ready to be served. The dish? <a href="https://evolveum.com/training-and-certification/midpoint-deployment-notification-configuration-self-paced/">MidPoint Deployment: Notification Configuration training</a>, our new mini-course!</p>
<h2>What Is a Mini-Course?</h2>
<p>Inspired by its older siblings, a mini-course is a short, focused training course designed to be completed in just a few hours. Quick to consume &#8211; but packed with flavor and (hopefully) tasty. It’s designed to fit into your schedule. Delivered fully online &#8211; no travelling is needed.</p>
<h2>What Is Inside?</h2>
<p>The ingredients (objectives) of the mini-course are the following:</p>
<ul>
<li>Understand the notification mechanism &#8211; how and where notifications are configured</li>
<li>Understand events, notifiers, and filters &#8211; the basic components and mechanisms behind notifications</li>
<li>Configure basic notifiers &#8211; use notifications with default configuration, such as e-mail subject and body</li>
<li>Customize notification configuration &#8211; customize the notification configuration, including e-mail subject, body, HTML support, attachments, and localization</li>
</ul>
<p>Before taking this training course, make sure you have polished your silverware: complete the <a href="https://evolveum.com/midpoint-foundation-training-series/">MidPoint Foundation Training series</a>.</p>
<p>Are you hungry for knowledge?</p>
<p><a href="https://evolveum.com/training-and-certification/midpoint-deployment-notification-configuration-self-paced/">Explore the course</a> in more detail and see if it’s your taste.*</p>
<p>Bon appétit!</p>
<hr />
<p>* Organizations that have been subscribed to Evolveum support for at least two years can request access for free, if they fulfil the prerequisites. Others can gain access by purchasing the Intermediate Configuration training and receiving a Certificate of Completion.</p>
<p>The post <a rel="nofollow" href="https://evolveum.com/now-serving-notification-configuration-training-course/">Now Serving: Notification Configuration Training Course</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://evolveum.com/now-serving-notification-configuration-training-course/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Women in Engineering 2025 &#8211; How to Make IGA More Inclusive</title>
		<link>https://evolveum.com/women-in-engineering-2025/</link>
					<comments>https://evolveum.com/women-in-engineering-2025/#respond</comments>
		
		<dc:creator><![CDATA[Anna Ogurekova]]></dc:creator>
		<pubDate>Mon, 23 Jun 2025 11:37:47 +0000</pubDate>
				<category><![CDATA[Latest news]]></category>
		<category><![CDATA[Other]]></category>
		<category><![CDATA[Women in engineering]]></category>
		<guid isPermaLink="false">https://evolveum.com/?p=12513</guid>

					<description><![CDATA[<p>Although more women have entered the engineering profession in recent years, it continues to be predominantly male dominated. The discrepancies begin in education. Only 35% of STEM graduates are women, and this number has not changed in the past 10 years1. Once these women enter the workforce, they might still change their career paths due <a href="https://evolveum.com/women-in-engineering-2025/" rel="nofollow"><span class="sr-only">Read more about Women in Engineering 2025 &#8211; How to Make IGA More Inclusive</span>[&#8230;]</a></p>
<p>The post <a rel="nofollow" href="https://evolveum.com/women-in-engineering-2025/">Women in Engineering 2025 &#8211; How to Make IGA More Inclusive</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Although more women have entered the engineering profession in recent years, it continues to be predominantly male dominated. The discrepancies begin in education. Only 35% of STEM graduates are women, and this number has not changed in the past 10 years<sup><a id="ref1" href="#footnote1">1</a></sup>. Once these women enter the workforce, they might still change their career paths due to multiple reasons. Reasons include a lack of early encouragement, mentoring, and a clear onboarding path.</p>
<p>International Women in Engineering Day<sup><a id="ref2" href="#footnote2">2</a></sup> was established to celebrate the achievements and contributions of women engineers, to promote gender diversity, and to encourage more women to consider engineering as a career.b This year, in light of celebrating <strong>#inWed2025</strong> and the theme <strong>#togetherweengineer</strong>, we at Evolveum would like to emphasize how important it is to make identity governance and administration more accessible to newcomers. This post offers practical suggestions how software vendors, integrators, and end users can become more welcoming, not only for women, but for anyone who is interested in joining this field.</p>
<h2>1. Document Like You Want to Be Understood</h2>
<p>Poor documentation is more than a tech debt issue; it is an inclusion issue. When contributors come from different backgrounds, speak different first languages, or lack corporate IGA experience, they rely heavily on documentation to onboard.</p>
<h3>Inclusive IGA action:</h3>
<ul>
<li>Use clear, plain language in how-tos and architecture docs.</li>
<li>Provide small, runnable examples alongside theory.</li>
<li>Flag sections that require advanced domain knowledge, and explain why.</li>
</ul>
<p>Evolveum, as the vendor of an OSS platform, keeps everything public. Anyone can access <a href="https://support.evolveum.com/projects/midpoint/">the Support Portal</a>, <a href="https://docs.evolveum.com">online technical documentation</a>, midPoint’s code, etc. Hence, it is extremely important to us that a reader can easily navigate through our vast resources and comprehend it well. We are aware of improvements we need to make when it comes to our documentation and the language we use. One of our top priorities in the coming months and years is unifying the language with industry standards and simplifying, improving, and adding missing technical documentation.</p>
<h2>2. Create a Clear Learning Path</h2>
<p>Even with good documentation, newcomers may feel overwhelmed and not know where to start. Comprehensive and structured training can help them navigate through tons of materials and provide step-by-step guidance on how to work with a new piece of technology. This will ultimately give them confidence in their abilities to continue their education on their own.</p>
<h3>Inclusive IGA action:</h3>
<ul>
<li>Curate beginner-friendly training to introduce new technology.</li>
<li>Where possible, link relevant parts of documentation to facilitate further study.</li>
<li>Provide suggestions for the next steps upon successful completion.</li>
</ul>
<p>Over the past couple of years, Evolveum has invested heavily in a new training curriculum, <a href="https://evolveum.com/midpoint-foundation-training-series/">the MidPoint Foundation Training Series</a>. Within the series, there are 3 training courses available in an online or a self-paced version that focus not only on building knowledge about IdM, IGA, and midPoint, but also to help newcomers with best practices and common situations they will encounter when entering this field. We even made <a href="https://evolveum.com/training-and-certification/midpoint-deployment-first-steps-self-paced/">the self-paced First Steps training</a> available for free to anyone to help them get started.<br />
Moreover, we published <a href="https://docs.evolveum.com/book/">the Practical Identity Management with MidPoint book</a>, which helps guide people who are just starting in this field in understanding both basic principles and more advanced topics.</p>
<h2>3. Encourage Asking Questions Publicly</h2>
<p>Private messages and insider communication channels often isolate information that could be beneficial to newcomers. Encourage people to ask questions in public spaces.</p>
<h3>Inclusive IGA action:</h3>
<ul>
<li>Create a safe space for your community to ask questions and engage with one another.</li>
<li>Encourage public forums and Gitter discussions.</li>
<li>Redirect questions asked privately into public spaces.</li>
</ul>
<p>At Evolveum, we value the collective experience of our community and encourage newcomers to engage in a variety of ways. Questions can be asked through <a href="https://lists.evolveum.com/mailman/listinfo/">the mailing lists</a>, which are also fully indexed and searchable via search engines. For more technical discussions, <a href="https://gitter.im/Evolveum/midpoint">Gitter</a> provides an active space, and we are also aware of ongoing public conversations on Reddit. We host online webinars where we give attendees the opportunity to ask questions in a form that suits them best &#8211; by unmuting themselves and directly asking the question, posting it in a chat, or writing it anonymously on Slido. During our recent <a href="https://evolveum.com/midpoint-community-meetup-2025-review/">MidPoint Community Meetup</a>, there were opportunities to ask questions in person or anonymously on Slido as well.</p>
<h2>4. Celebrate Contributions</h2>
<p>For open source products, activities such as writing connector code, joining localization efforts, and configuring samples are vital to the entire IGA ecosystem. Regardless of the openness of the code, everyone can help by sharing a success story in a case study or writing a candid review on platforms like <a href="https://www.gartner.com/reviews/market/identity-governance-administration/vendor/evolveum/product/midpoint">Gartner Peer Review</a>.</p>
<h3>Inclusive IGA action:</h3>
<ul>
<li>Create comprehensive steps on how and where to contribute.</li>
<li>Publicly recognize contributors and provide them space to shine.</li>
<li>Encourage new members to contribute.</li>
</ul>
<p><a href="https://evolveum.com/community/">The midPoint community</a> prides itself on its many contributions. Some of the examples include the collaborative efforts that added to <a href="https://docs.evolveum.com/connectors/connectors/">the library of connectors</a> with its almost 70 open code connectors, midPoint being translated into <a href="https://explore.transifex.com/evolveum/midpoint/">20 languages</a>, the expansion of <a href="https://github.com/Evolveum/midpoint-samples/tree/master/samples">the samples contribution directory</a>, and <a href="https://evolveum.com/resource-library/">case studies</a> continuing to bring insights into real life examples.</p>
<h2>5. Promote Diverse Voices in Content</h2>
<p>If all webinars, blog posts, and case studies feature only one group, we risk reinforcing the image of who belongs in IGA.</p>
<h3>Inclusive IGA action:</h3>
<ul>
<li>Feature stories from different cultural and technical backgrounds.</li>
<li>Use imagery and language that reflects a diverse global user base.</li>
</ul>
<p>We are happy to see more and more women entering the IGA space, and we try to inspire others to join this field. At Evolveum, we publish a <a href="https://evolveum.com/tag/women-in-it/">Women in IT</a> blog post annually, each year highlighting the work of our female team members. In addition, last year we collaborated with engineers from the midPoint community who participated in <a href="https://evolveum.com/celebrating-women-in-engineering-2024-midpoint-edition/">#inwed24</a>.</p>
<hr />
<p>&nbsp;</p>
<p>Inclusion isn&#8217;t about optics; it is about mindset. IGA projects can serve as platforms for equity, growth, and visibility, but we have to choose to build and run them that way. Ask yourself these questions often: Do we make time to onboard newcomers? Do we treat documentation as a first-class deliverable? Do we notice who isn&#8217;t in the room &#8211; and do we wonder why?</p>
<p>If you work on, contribute to, or deploy an IGA tool, this is an invitation to help shape a more inclusive ecosystem. Let’s build a welcoming IGA environment where everyone sees a point of entry, because <strong>#togetherweengineer</strong>.</p>
<p>&nbsp;</p>
<p>If you would like to learn more about associations and societies that promote gender equality in IT and engineering, please consider visiting:</p>
<ul>
<li><a href="https://swe.org">The Society of Women Engineers</a></li>
<li><a href="https://www.wes.org.uk">The Women Engineering Society</a></li>
<li><a href="https://www.inwed.org.uk">International Women in Engineering Day</a></li>
<li><a href="https://www.wepan.org">The Women in Engineering ProActive Network (WEPAN)</a></li>
<li><a href="https://www.iam-her.org">IAM Her</a></li>
</ul>
<hr />
<ol>
<li id="footnote1">Global Education Monitoring Report Team. (2024). Global education monitoring report 2024, gender report: Technology on her terms. UNESCO, <a href="https://unesdoc.unesco.org/ark:/48223/pf0000389406">https://unesdoc.unesco.org/ark:/48223/pf0000389406</a> <a href="#ref1">↩︎</a></li>
<li id="footnote2">International Women in Engineering Day, <a href="https://www.inwed.org.uk">https://www.inwed.org.uk</a> <a href="#ref2">↩︎</a></li>
</ol>
<p>The post <a rel="nofollow" href="https://evolveum.com/women-in-engineering-2025/">Women in Engineering 2025 &#8211; How to Make IGA More Inclusive</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://evolveum.com/women-in-engineering-2025/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
