<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Evolveum | Open Source Identity Management &amp; Governance</title>
	<atom:link href="https://evolveum.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://evolveum.com</link>
	<description>Face your security challenges with OSS state-of-the-art platform midPoint, a matchless combination of IdM and Identity Governance.</description>
	<lastBuildDate>Wed, 01 Apr 2026 11:08:54 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Never Too Young For OSS IGA: MidPoint and MidPilot Saving the Preschoolers’ Day</title>
		<link>https://evolveum.com/never-too-young-for-oss-iga/</link>
					<comments>https://evolveum.com/never-too-young-for-oss-iga/#respond</comments>
		
		<dc:creator><![CDATA[Veronika Kolpascikova]]></dc:creator>
		<pubDate>Wed, 01 Apr 2026 11:08:54 +0000</pubDate>
				<category><![CDATA[Latest news]]></category>
		<guid isPermaLink="false">https://evolveum.com/?p=14583</guid>

					<description><![CDATA[<p>Children today need more attention than ever before. With shorter attention spans, diverse learning needs, and a world full of distractions, preschoolers are quick to notice when they’re not getting enough guidance. This week, a group of kids at a local kindergarten decided to take matters into their own hands. It all started during snack <a href="https://evolveum.com/never-too-young-for-oss-iga/" rel="nofollow"><span class="sr-only">Read more about Never Too Young For OSS IGA: MidPoint and MidPilot Saving the Preschoolers’ Day</span>[&#8230;]</a></p>
<p>The post <a rel="nofollow" href="https://evolveum.com/never-too-young-for-oss-iga/">Never Too Young For OSS IGA: MidPoint and MidPilot Saving the Preschoolers’ Day</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Children today need more attention than ever before. With shorter attention spans, diverse learning needs, and a world full of distractions, preschoolers are quick to notice when they’re not getting enough guidance. This week, a group of kids at a local kindergarten decided to take matters into their own hands. </p>
<p>It all started during snack time. One child complained that story time was always rushed. Another pointed out that arts and crafts often got cut short because the teachers were busy preparing schedules, tracking attendance, and managing supplies. After an intense session of drawing, excited jabber, and passing notes under the table, they came up with a bold plan: a formal complaint to the teachers.</p>
<p>Their reasoning was surprisingly logical: if teachers were overwhelmed by manual processes, maybe there was another way to deal with them. And what better solution was there than midPoint, the EU-made and owned open-source platform that grown-ups use to organize hundreds of systems efficiently? According to the kids’ paper-detailed presentation, full of watercolor deployment schemas, adopting <strong>midPoint</strong> &#8211; and summoning its fairy unicorn AI helper, <strong><a href="https://evolveum.com/ai-powered-iga/" rel="noopener noreferrer" target="blank">midPilot</a></strong> &#8211; would free up teachers’ time for what truly matters: playing, learning, and listening to the children. </p>
<p>The challenges they faced weren’t just small inconveniences &#8211; they were a fearsome multi-headed dragon of tasks: one head for schedules, one for attendance, one for supplies, and even one that consumed story time itself. With its magical AI powers, midPilot could swiftly connect all the classroom systems to midPoint &#8211; the central castle of the magical kingdom that managed all the teachers &#8211; organizing schedules, tracking supplies, and even whispering reminders about who needed extra attention that day. Together, midPoint and midPilot promised to slay the dragon, banish tedious tasks, and restore order to the kingdom, leaving teachers free to focus on the children and ensuring that no story time would ever be cut short again.</p>
<p><img class="size-medium wp-image-9041 aligncenter" src="https://evolveum.com/wp-content/uploads/evolveum-midpoint-april-01-2026.jpg" alt="" width="1200"/></p>
<p>With the dragon under control, the teachers were free to focus on the children, giving every story time, craft project, and snack their full attention. The unicorn and the castle worked together like magic: repetitive tasks vanished, new apps got onboarded in a wave of a magic wand, and the kingdom ran smoothly. By the end of the week, the teachers had received a colorful stack of drawings, charts, and flow diagrams &#8211; proof that the kids were serious. Even preschoolers had figured it out: when the multi-headed dragon of manual tasks are defeated, there’s more time for what truly matters &#8211; learning, playing, and paying attention to each other. MidPoint and midPilot had shown the kingdom that efficiency isn’t just for grown-ups; even the smallest users understand its magic.</p>
<p>Happy April 1st!</p>
<p>The post <a rel="nofollow" href="https://evolveum.com/never-too-young-for-oss-iga/">Never Too Young For OSS IGA: MidPoint and MidPilot Saving the Preschoolers’ Day</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://evolveum.com/never-too-young-for-oss-iga/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Top 5 IAM Conferences and Identity Security Events to Attend in 2026</title>
		<link>https://evolveum.com/top-5-iam-conferences-and-identity-security-events-2026/</link>
					<comments>https://evolveum.com/top-5-iam-conferences-and-identity-security-events-2026/#respond</comments>
		
		<dc:creator><![CDATA[Mita Chu]]></dc:creator>
		<pubDate>Tue, 17 Mar 2026 08:25:01 +0000</pubDate>
				<category><![CDATA[Community]]></category>
		<category><![CDATA[Evolveum's Identity Management and Governance Blog]]></category>
		<guid isPermaLink="false">https://evolveum.com/?p=14405</guid>

					<description><![CDATA[<p>If you’re responsible for identity security, staying ahead of industry trends is essential. Identity and access management (IAM) has become the backbone of modern cybersecurity, especially as organizations move toward Zero Trust architectures and identity-centric security models. For CISOs, CIOs, and identity leaders, IAM conferences offer one of the best opportunities to stay current on <a href="https://evolveum.com/top-5-iam-conferences-and-identity-security-events-2026/" rel="nofollow"><span class="sr-only">Read more about Top 5 IAM Conferences and Identity Security Events to Attend in 2026</span>[&#8230;]</a></p>
<p>The post <a rel="nofollow" href="https://evolveum.com/top-5-iam-conferences-and-identity-security-events-2026/">Top 5 IAM Conferences and Identity Security Events to Attend in 2026</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If you’re responsible for identity security, staying ahead of industry trends is essential. Identity and access management (IAM) has become the backbone of modern cybersecurity, especially as organizations move toward Zero Trust architectures and identity-centric security models.</p>
<p>For CISOs, CIOs, and identity leaders, IAM conferences offer one of the best opportunities to stay current on emerging technologies, regulatory changes, and best practices in identity and access management.</p>
<p>Here are five identity security events worth adding to your 2026 calendar.</p>
<h2>1. Gartner Identity &amp; Access Management Summit</h2>
<p><b>Best for:</b> C-suite and IAM program leaders who want to benchmark strategy, validate roadmaps, evaluate IAM investments, and get direct access to Gartner analysts.<br />
<b>Location:</b> London, UK (EMEA) | Las Vegas, Nevada (US)<br />
<b>Date:</b> London: March 9–10, 2026 | Las Vegas: December 7–9, 2026</p>
<p><strong><a href="https://www.gartner.com/en/conferences/emea/identity-access-management-uk">Gartner IAM Summit</a> </strong>is often considered one of the most influential identity leadership events for CISOs and CIOs responsible for enterprise IAM strategy. The 2026 theme, <i>Identity at the Core</i>, reflects the growing recognition that IAM is no longer a standalone security function. Instead, it underpins business resilience, Zero Trust initiatives, AI adoption, and digital transformation. Sessions are grounded in Gartner&#8217;s primary research, drawing on thousands of conversations with security leaders worldwide. The event draws more than 1,500 peers and 20+ Gartner analysts, and offers 50 solution provider sessions.</p>
<p>Sessions typically cover:</p>
<ul>
<li>IAM program maturity models</li>
<li>Identity governance and administration</li>
<li>Privileged access management</li>
<li>Identity-first Zero Trust strategies</li>
<li>Agentic AI and Emerging Technologies</li>
</ul>
<p><b>Why CISOs attend:</b> Gartner’s website states that attendees can book one-on-one sessions directly with analysts to review their specific IAM roadmap. The program is built from primary research and is strong on strategy validation and vendor shortlisting.</p>
<h2>2. European Identity and Cloud Conference (EIC)</h2>
<p><b>Best for:</b> Enterprise identity leaders and architects who want an analyst-driven view of where identity security is heading globally, with a strong European regulatory lens.<br />
<b>Location:</b> Berlin, Germany<br />
<b>Dates:</b> May 19–22, 2026</p>
<p>Organized by KuppingerCole Analysts, <strong><a href="https://www.kuppingercole.com/events/eic2026">EIC</a> </strong>brings together analysts, CISOs, IAM architects, and identity vendors to explore the future of digital identity. The 2026 theme, <i>Pioneering Digital Identity Ecosystems</i>, focuses on how identity security must adapt as AI automation accelerates and non-human identities expand the attack surface. Key topics include:</p>
<ul>
<li>AI supply chain risk and machine identity governance</li>
<li>Modern IGA for cloud-first environments</li>
<li>Cross-border trust frameworks</li>
<li>Decentralized identity and digital identity wallets</li>
<li>Privacy-by-design for digital identity</li>
</ul>
<p>The conference typically attracts more than 1,000 identity professionals and features 200+ sessions across identity, security, privacy, and governance.</p>
<p><b>Why to attend:</b> EIC gives identity and security leaders a structured, research-backed view of where the market is heading, which is valuable for long-term strategy, regulatory planning, and understanding how peers across Europe are approaching identity transformation.</p>
<p style="text-align: center;">
<iframe loading="lazy" title="Governing Non-Human Identities with Proven IGA Principles: Slávek Licehammer&#039;s Talk at EIC2025" width="640" height="360" src="https://www.youtube.com/embed/dhx4PVdkyM4?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Watch Evolveum’s Head of Engineering Slavek Licehammer’s talk at the EIC 2025 on how to govern non-human identities.</p>
<h2>3. The 2nd Annual MidPoint Community Meetup</h2>
<p><b>Best for:</b> Identity leaders, system engineers, and architects who use or are evaluating IGA – with practical <a href="https://evolveum.com/midpoint/">midPoint</a> deployment examples, direct access to the product team, and a strong focus on European regulations and digital sovereignty.<br />
<b>Location:</b> Prague, Czech Republic<br />
<b>Dates:</b> May 12–15, 2026</p>
<p>The <strong><a href="https://evolveum.com/events/mcm2026/">MidPoint Community Meetup</a></strong> is an annual event hosted by Evolveum, the team behind the open source identity governance and administration platform midPoint. The 2nd Annual MidPoint Community Meetup brings together IGA newcomers, midPoint users, integrators, and Evolveum product and solution engineering teams for a focused, hands-on 3.5 day program. The 2026 focus areas include:</p>
<ul>
<li>Practical IGA implementation and real-world deployment examples from companies like the European Commission and Trench Group</li>
<li>AI-powered identity governance in a safe, human-centered way</li>
<li>The midPoint product roadmap and features under development</li>
<li>Identity lifecycle automation and IGA best practices</li>
<li>Compliance and policy modeling in open source environments</li>
</ul>
<p>The event is intentionally intimate, designed for hands-on workshops and “bring your own problem” sessions, drawing over 200 peers across a 3.5-day format.</p>
<p><b>Why to attend:</b> For teams running midPoint or evaluating open source IGA, the 2nd Annual MidPoint Community Meetup offers a level of direct product access and community depth that no large conference can replicate. Content is shaped by the community, not analysts or sponsors.</p>
<p><img loading="lazy" class="wp-image-14466 aligncenter" src="https://evolveum.com/wp-content/uploads/evolveum-mcm-walking-tour-300x200.jpg" alt="" width="504" height="336" srcset="https://evolveum.com/wp-content/uploads/evolveum-mcm-walking-tour-300x200.jpg 300w, https://evolveum.com/wp-content/uploads/evolveum-mcm-walking-tour-1024x683.jpg 1024w, https://evolveum.com/wp-content/uploads/evolveum-mcm-walking-tour-768x512.jpg 768w, https://evolveum.com/wp-content/uploads/evolveum-mcm-walking-tour-1536x1024.jpg 1536w, https://evolveum.com/wp-content/uploads/evolveum-mcm-walking-tour-2048x1365.jpg 2048w, https://evolveum.com/wp-content/uploads/evolveum-mcm-walking-tour-750x500.jpg 750w, https://evolveum.com/wp-content/uploads/evolveum-mcm-walking-tour-1320x880.jpg 1320w, https://evolveum.com/wp-content/uploads/evolveum-mcm-walking-tour-600x400.jpg 600w" sizes="(max-width: 504px) 100vw, 504px" /></p>
<p style="text-align: center;">A tour of the historic center of Bratislava during the MidPoint Community Meetup 2025.</p>
<h2>4. Identiverse</h2>
<p><b>Best for:</b> Identity professionals across all roles – developers, architects, and security leaders who want practitioner-level depth across the full IAM spectrum.<br />
<b>Location:</b> Mandalay Bay, Las Vegas, Nevada<br />
<b>Dates:</b> June 15–18, 2026</p>
<p><strong><a href="https://identiverse.com/">Identiverse</a></strong> is the largest event dedicated entirely to digital identity, convening over 3,000 security professionals. The 2026 program is built around four defined content pillars: AI identity, continuous identity, passkeys &amp; wallets, and non-human &amp; agentic AI identity. Key topics include:</p>
<ul>
<li>Passwordless authentication, passkeys, and digital wallets</li>
<li>Identity protocols and emerging standards (OAuth, OpenID Connect, FIDO, CAEP, OpenID AuthZEN)</li>
<li>Non-human identity and agentic AI access management</li>
<li>Identity orchestration and continuous authentication</li>
<li>Identity threat detection and response (ITDR)</li>
</ul>
<p>The agenda is curated by an independent content committee and offers up to 20 CPE credits.</p>
<p><b>Why to attend:</b> Identiverse goes deeper on identity protocols and engineering than most IAM events, making it a go-to conference for identity engineers and architects.</p>
<h2>5. Identity Week</h2>
<p><b>Best for:</b> Security leaders working at the intersection of enterprise IAM and physical identity in regulated industries or government-adjacent sectors.<br />
<b>Locations:</b> RAI Amsterdam, Netherlands | Washington, D.C.<br />
<b>Dates:</b> June 9–10, 2026 (Amsterdam) | September 2–3, 2026 (D.C.)</p>
<p><strong><a href="https://identityweek.net/">Identity Week</a> </strong>sits at the intersection of digital identity, physical identity, and biometrics. The 2026 theme, <i>Identity 2030: Building Trust Across Borders, Platforms, and People</i>, focuses on trust across jurisdictions and industries. Key topics include:</p>
<ul>
<li>Synthetic identity fraud and AI-generated impersonation</li>
<li>Continuous behavioral authentication</li>
<li>Mobile driver&#8217;s licenses (mDLs) and digital travel credentials (DTCs)</li>
<li>EES and ETIAS interoperability for EU border management</li>
<li>Convergence of physical and digital document security</li>
</ul>
<p>Identity Week is the largest event on this list, attracting 4,000+ attendees. The Americas edition is introducing new programming on cross-sector financial crime and fraud for 2026.</p>
<p><b>Why to attend:</b> For security leaders whose identity strategy touches identity verification, biometrics, or regulated digital credentials.</p>
<h2>Final thoughts</h2>
<p>Identity security is rapidly becoming the primary control plane of modern cybersecurity. With the rise of machine identities, AI-driven attacks, and identity-based threats, IAM is a strategic priority for CISOs and CIOs alike. Attending conferences is one way to quickly get up to speed with the latest trends and stay ahead of the technologies shaping the future of identity security.</p>
<p>The post <a rel="nofollow" href="https://evolveum.com/top-5-iam-conferences-and-identity-security-events-2026/">Top 5 IAM Conferences and Identity Security Events to Attend in 2026</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://evolveum.com/top-5-iam-conferences-and-identity-security-events-2026/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Representing Digital Sovereignty in IGA at the Gartner IAM Summit 2026</title>
		<link>https://evolveum.com/representing-digital-sovereignty-in-iga-at-the-gartner-iam-summit-2026/</link>
					<comments>https://evolveum.com/representing-digital-sovereignty-in-iga-at-the-gartner-iam-summit-2026/#respond</comments>
		
		<dc:creator><![CDATA[Veronika Kolpascikova]]></dc:creator>
		<pubDate>Mon, 16 Mar 2026 16:42:29 +0000</pubDate>
				<category><![CDATA[Community]]></category>
		<category><![CDATA[Evolveum's Identity Management and Governance Blog]]></category>
		<category><![CDATA[Latest news]]></category>
		<category><![CDATA[Other]]></category>
		<category><![CDATA[conference]]></category>
		<guid isPermaLink="false">https://evolveum.com/?p=14469</guid>

					<description><![CDATA[<p>Digital identity is no longer just an IT tech team topic. At this year’s Gartner Identity &#038; Access Management Summit in London (March 9 &#8211; 10), it was clear that identity security is becoming a board-level priority, driven by rising cyber threats, regulatory pressure, and the growing importance of technological sovereignty. As organizations increasingly evaluate <a href="https://evolveum.com/representing-digital-sovereignty-in-iga-at-the-gartner-iam-summit-2026/" rel="nofollow"><span class="sr-only">Read more about Representing Digital Sovereignty in IGA at the Gartner IAM Summit 2026</span>[&#8230;]</a></p>
<p>The post <a rel="nofollow" href="https://evolveum.com/representing-digital-sovereignty-in-iga-at-the-gartner-iam-summit-2026/">Representing Digital Sovereignty in IGA at the Gartner IAM Summit 2026</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Digital identity is no longer just an IT tech team topic. At this year’s <strong><a href="https://www.gartner.com/en/conferences/emea/identity-access-management-uk" target="blank" rel="noopener noreferrer">Gartner Identity &#038; Access Management Summit</a></strong> in London (March 9 &#8211; 10), it was clear that identity security is becoming a board-level priority, driven by rising cyber threats, regulatory pressure, and the growing importance of technological sovereignty.</p>
<p>As organizations increasingly evaluate where their critical infrastructure comes from and who controls it, the importance of European-owned technologies is growing. At Evolveum, we brought this discussion to our booth, as midPoint is exactly where EU sovereignty meets open source IGA. That is what midPoint has always been and always will be: a complete open source IGA platform. Not only is it recognized by Gartner as such and developed and owned in Europe, it provides freedom across many dimensions.</p>
<p><img class="size-medium wp-image-9041 aligncenter" src="https://evolveum.com/wp-content/uploads/evolveum-midpoint-gartner-iam-summit-2026-01.jpg" alt="" width="500"/></p>
<h2>Live midPoint demos driven by real questions</h2>
<p>At our booth, Evolveum’s Head of Engineering Slávek Licehammer offered midPoint demonstrations with a twist: instead of having a pre-recorded video, he invited visitors to ask what they wanted to see and demonstrated midPoint live based on their requests. This format led to highly practical discussions focused on real-world identity governance and administration challenges.</p>
<p>One of the capabilities that attracted significant interest was the <strong><a href="https://evolveum.com/midpoint/#simulations-section" target="blank" rel="noopener noreferrer">Simulations feature</a></strong>. This functionality allows organizations to evaluate the impact of configuration changes on real data before implementing them, helping teams make informed decisions without risking disruptions to production environments. From a business perspective, this means reducing operational risk, preventing costly configuration errors, and improving data quality without slowing down innovation.</p>
<p>Another major topic at our booth was rapid application onboarding, one of the most persistent challenges in IGA programs. Pavol Mederly, Evolveum’s Chief Product Officer, demonstrated <strong><a href="https://evolveum.com/ai-powered-iga/" target="blank" rel="noopener noreferrer">midPilot</a></strong>, midPoint’s AI-powered assistant designed to accelerate application onboarding and improve visibility across identity ecosystems.</p>
<p><img class="size-medium wp-image-9041 aligncenter" src="https://evolveum.com/wp-content/uploads/evolveum-midpoint-gartner-iam-summit-2026-02.jpg" alt="" width="500"/></p>
<h2>Rethinking application onboarding with AI</h2>
<p>Today, roughly 80% of cyberattacks exploit identity-related vulnerabilities, and one of the biggest contributing factors is incomplete application integration. When applications are not properly governed, they create security blind spots. Interest in this topic was clearly reflected in Pavol Mederly’s theater session on day two, titled <strong><a href="https://docs.evolveum.com/talks/files/2026-03-evolveum-midpoint-gartner-iam-summit-2026-presentation.pdf" target="blank" rel="noopener noreferrer">The hidden cost of slow application onboarding in IGA</a></strong>.</p>
<p>The session focused on common but often underestimated problems:</p>
<ul>
<li>1. Highly skilled engineers spending large amounts of time building and maintaining integrations instead of delivering strategic value.</li>
<li>2. The risk of low visibility across numerous connected systems.</li>
</ul>
<p>The presentation showed how midPilot &#8211; the integral AI part of midPoint &#8211; addresses these challenges with a no/low-code approach combined with AI assistance, and significantly reduces this burden.</p>
<p>The strong attendance of Pavol’s theater session confirmed that this challenge remains one of the most relevant operational issues in IGA programs today.</p>
<p><img class="size-medium wp-image-9041 aligncenter" src="https://evolveum.com/wp-content/uploads/evolveum-midpoint-gartner-iam-summit-2026-03-01.jpg" alt="" width="850"/><br />
<img class="size-medium wp-image-9041 aligncenter" src="https://evolveum.com/wp-content/uploads/evolveum-midpoint-gartner-iam-summit-2026-03-02.jpg" alt="" width="850"/></p>
<h2>Community, conversations, and a bit of fun</h2>
<p>During the summit, we had many valuable conversations with C-level people, architects, security leaders, and IGA practitioners facing similar challenges across industries. Beyond technological discussions, we added a bit of fun to the experience. Visitors could participate in our raffle for a Lord of the Rings Sauron LEGO set by <strong><a href="https://www.linkedin.com/search/results/all/?keywords=%23memepoint%20%23gartneriam&#038;origin=GLOBAL_SEARCH_HEADER" target="blank" rel="noopener noreferrer">playing memePoint</a></strong>, our identity-themed meme matching game where participants paired funny captions with equally funny images to create the best combination. It turned out to be a great conversation starter and a reminder that even in a serious field like cybersecurity, creativity and community matter.</p>
<p><img class="size-medium wp-image-9041 aligncenter" src="https://evolveum.com/wp-content/uploads/evolveum-midpoint-gartner-iam-summit-2026-04.jpg" alt="" width="850"/></p>
<h2>Looking ahead</h2>
<p>Events like the Gartner IAM Summit confirm what we see across the industry: identity management and governance is becoming more strategic, more complex, and more central to organizational security. Digital sovereignty is becoming a must.</p>
<p>At the same time, organizations are looking for solutions that are not only powerful, but also transparent, flexible, and future-proof. This is exactly where the combination of open source and strong identity governance and administration capabilities continues to stand out.</p>
<p>We are grateful to everyone who stopped by our booth, joined our session, or shared their identity challenges with us. We look forward to continuing these conversations and seeing how the identity community continues to evolve: feel free to join us at the next event from May 12-15 in Prague &#8211; <strong><a href="https://evolveum.com/events/mcm2026/">the 2nd Annual MidPoint Community Meetup</a></strong>.</p>
<p></br></p>
<p style="text-align: center;">This project has received funding from the European Union through the Recovery and Resilience Plan of the Slovak Republic.</p>
<style>
  @media (max-width: 600px) {<br />
    .vertical-separator {<br />
      display: none;<br />
    }<br />
  }<br />
</style>
<div style="text-align: center; margin-top: 40px;">
<hr style="border: none; border-top: 1px solid #2a2768; width: 100%; margin: 0 0 20px 0;" />
<div style="display: flex; justify-content: center; align-items: center; flex-wrap: wrap; gap: 40px; margin-bottom: 20px;">
<div style="display: flex; align-items: center;"><a style="display: flex; align-items: center;" href="https://next-generation-eu.europa.eu/" target="_blank" rel="noopener"><br />
<img style="height: 80px; width: auto; object-fit: contain; display: block;" src="https://evolveum.com/wp-content/uploads/funded-by-the-eu-next-generation-logo.png" alt="Funded by the Next Generation EU" /><br />
</a></div>
<div class="vertical-separator" style="width: 1px; height: 100px; background-color: #2a2768;"></div>
<div style="display: flex; align-items: center;"><a style="display: flex; align-items: center;" href="https://www.planobnovy.sk/" target="_blank" rel="noopener"><br />
<img style="height: 80px; width: auto; object-fit: contain; display: block;" src="https://evolveum.com/wp-content/uploads/recovery-and-resilience-plan-logo.png" alt="Recovery and Resilience Plan" /><br />
</a></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://evolveum.com/representing-digital-sovereignty-in-iga-at-the-gartner-iam-summit-2026/">Representing Digital Sovereignty in IGA at the Gartner IAM Summit 2026</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://evolveum.com/representing-digital-sovereignty-in-iga-at-the-gartner-iam-summit-2026/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>On-Premises vs Cloud IGA: Where Should You Deploy Your Identity Security Platform?</title>
		<link>https://evolveum.com/on-premises-vs-cloud-iga/</link>
					<comments>https://evolveum.com/on-premises-vs-cloud-iga/#respond</comments>
		
		<dc:creator><![CDATA[Mita Chu]]></dc:creator>
		<pubDate>Tue, 24 Feb 2026 15:21:25 +0000</pubDate>
				<category><![CDATA[Deployment]]></category>
		<category><![CDATA[Evolveum's Identity Management and Governance Blog]]></category>
		<guid isPermaLink="false">https://evolveum.com/?p=13972</guid>

					<description><![CDATA[<p>Choosing where your identity governance and administration (IGA) platform should be deployed is not as easy as it might seem. At first glance, choosing between on-premises and cloud IGA may seem like a simple technology preference. In practice, it determines how much control you maintain over identity data, how confidently you pass audits, how you <a href="https://evolveum.com/on-premises-vs-cloud-iga/" rel="nofollow"><span class="sr-only">Read more about On-Premises vs Cloud IGA: Where Should You Deploy Your Identity Security Platform?</span>[&#8230;]</a></p>
<p>The post <a rel="nofollow" href="https://evolveum.com/on-premises-vs-cloud-iga/">On-Premises vs Cloud IGA: Where Should You Deploy Your Identity Security Platform?</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Choosing where your identity governance and administration (IGA) platform should be deployed is not as easy as it might seem. At first glance, choosing between on-premises and cloud IGA may seem like a simple technology preference. In practice, it determines how much control you maintain over identity data, how confidently you pass audits, how you integrate with the rest of your environment, and how well your security controls hold up as your organization grows.</p>
<p>Over the last decade, many organizations moved rapidly toward cloud services under the assumption that the cloud is always simpler, more cost-effective, and modern. Yet recent data from <a href="https://news.broadcom.com/releases/private-cloud-outlook-2025-report" target="blank" rel="noopener noreferrer">Broadcom&#8217;s Private Cloud Outlook 2025 report</a> shows that 69% of organizations are now considering moving workloads back to private infrastructure, with security and control as primary drivers.</p>
<p>This article explores the pros and cons of each model and provides a framework to help you determine what fits your organization&#8217;s needs.</p>
<h2>Understanding the deployment models</h2>
<p><b>On-premises IGA</b> means the governance platform runs in your data center on infrastructure you control. This doesn&#8217;t limit what it can govern, as modern on-premises IGA integrates seamlessly with cloud applications, SaaS platforms, and hybrid environments while keeping the governance layer inside your environment.</p>
<p><b>Cloud IGA</b> (SaaS or IDaaS) runs entirely on vendor infrastructure. The platform lives in the vendor&#8217;s environment while managing identities across your systems. You configure policies while the provider manages servers, availability, and updates.</p>
<h2>The advantages of on-prem</h2>
<p><strong>Complete control over your identity security</strong><br />
Your IGA platform acts as the &#8220;keys to your kingdom,&#8221; governing who can access what across your entire digital ecosystem, and why. When the keys are in your pocket, you control security, availability, and custody over your identity data and operations.</p>
<p><strong>Full flexibility for unique workflows</strong><br />
Every organization has unique identity processes. On-premises IGA lets you customize workflows, access approval paths, policy rules, and reporting to match your exact requirements. You can build custom connectors for proprietary systems, create specialized identity governance and administration processes for complex organizational structures, and tailor compliance reporting to your specific regulatory needs.</p>
<p><strong>Straightforward regulatory compliance</strong><br />
<a href="https://docs.evolveum.com/midpoint/compliance/" target="blank" rel="noopener noreferrer">Regulations</a> such as HIPAA, NIS2, and GDPR require explicit evidence of data residency, access controls, and auditability. On-premises deployment makes audits easier because data stays inside your infrastructure without relying on vendor certifications. When auditors ask where identity data resides and who can access it, you provide direct evidence rather than interpreting the vendor’s compliance attestations.</p>
<p><strong>Integration with everything you run</strong><br />
Many enterprise applications were not built for the cloud era. On-premises IGA supports these systems without complex workarounds, whether connecting to legacy mainframes, an on-premises Active Directory, or modern cloud applications simultaneously. You control integration architecture without exposing internal systems to external networks.</p>
<p><strong>Offline capability</strong><br />
On-prem IGA does not require internet access to function unless you want to manage SaaS and other cloud applications. It can run fully inside isolated or air-gapped networks, which is a requirement in many government and critical infrastructure environments.</p>
<p><strong>Predictable long-term costs</strong><br />
Capital investment into servers, subscriptions, and support means costs remain stable over five to ten years. You avoid per-user pricing that compounds with growth, usage-based billing, and subscription increases that can double costs over time. For organizations planning long-term budgets, this predictability matters.</p>
<p><strong>Trade-offs of on-prem:</strong><br />
You need specialists for maintenance, upgrades, and patching. Upfront investment typically exceeds cloud alternatives, which can slow initial deployment. Your team owns responsibility for the platform&#8217;s uptime and upgrades, which represents essential control for some organizations and overhead for others. Scaling capacity is under your control rather than automatic, but increases in user volume are typically handled with configuration and resource tuning rather than re-architecture.</p>
<h2>The advantages of cloud IGA</h2>
<p><strong>Minimal infrastructure burden</strong><br />
The vendor handles platform operation, upgrades, and patches. For organizations without deep technical teams or those prioritizing speed, this removes infrastructure management entirely.</p>
<p><strong>Faster deployment</strong><br />
Cloud IGA often reduces the initial implementation timeline by eliminating the need for hardware procurement and internal server configuration. This is helpful for compliance deadlines or audit remediation requiring immediate governance capability.</p>
<p><strong>Easier scalability</strong><br />
Add 500 or 5,000 users through configuration changes without capacity planning, buying new hardware, or physical infrastructure expansion. The platform automatically scales to accommodate growth, acquisitions, and seasonal workforce changes.</p>
<p><strong>Continuous updates</strong><br />
Security patches and features deploy automatically without your team managing version upgrades or testing cycles. This simplifies maintenance and ensures the platform stays up-to-date.</p>
<p><strong>Dynamic pre-built integrations for SaaS</strong><br />
Cloud IGA vendors maintain extensive connector libraries optimized for cloud-to-cloud communication for major SaaS applications like Office 365, Salesforce, Workday, and ServiceNow, which simplifies onboarding cloud systems.</p>
<p><strong>Trade-offs of cloud deployment:</strong><br />
Your governance data is in a multi-tenant infrastructure alongside other organizations. You trust vendor security practices for the system controlling everything else. Customization is limited to vendor-provided features – you cannot modify core workflows or build custom integration logic. Outages stop your governance operations regardless of whether managed systems remain available. Internet connectivity is mandatory; you cannot operate during network disruptions. Per-user pricing, premium features, and API charges compound as you scale, with costs potentially doubling initial projections.</p>
<div class="midpoint-cta-block" style="background-color: #9dc2e6; padding: 12px 3%; border-radius: 8px; width: 100%; font-family: Roboto, sans-serif; color: white; box-shadow: 0 3px 8px rgba(0,0,0,0.1); display: flex; align-items: center; gap: 20px; box-sizing: border-box;">
<div style="padding-top: 5px; display: flex; align-items: center;"><img style="width: 70px; height: 70px; border-radius: 50%; object-fit: cover; background: white; padding: 6px; flex-shrink: 0;" src="https://evolveum.com/wp-content/uploads/midpoint-circle-logo.png" alt="midPoint logo" /></div>
<div style="height: 70px; border-left: 2px solid white; flex-shrink: 0;"></div>
<div style="text-align: left; display: flex; flex-direction: column; justify-content: center; height: 70px; flex-grow: 1; overflow: hidden;">
<p style="margin: 0; font-size: 16px;">Discover how midPoint&#8217;s open source IGA platform aligns with your unique needs and environment.</p>
<p style="margin: 0; font-size: 16px;"><a style="color: white; font-weight: bold; text-decoration: underline;" href="https://evolveum.com/midpoint/" target="_blank" rel="noopener">Explore midPoint.</a></p>
</div>
</div>
<h2>The cloud repatriation reality check</h2>
<p>According to <a href="https://news.broadcom.com/releases/private-cloud-outlook-2025-report" target="blank" rel="noopener">Broadcom&#8217;s Private Cloud Outlook 2025</a> report surveying 1,800 IT leaders, 69% of organizations are considering moving workloads from the public cloud back to private infrastructure. One-third have already done so, with 66% expressing serious concerns about public cloud compliance. Nearly half believe more than 25% of their cloud spending delivers no value.</p>
<p>This trend extends to identity governance. Organizations are recognizing that the platform governing access to everything shouldn&#8217;t itself be governed by anyone else, but remain the anchor point under their control.</p>
<p>At <a href="https://evolveum.com/" target="blank" rel="noopener, noreferrer noopener">Evolveum</a>, we&#8217;ve built midPoint around the principle that critical governance infrastructure deserves direct control, even when the applications being governed are deployed across hybrid or cloud environments.</p>
<h2>Making your decision: 8 critical questions to consider</h2>
<p><strong>Start with regulations</strong><br />
Questions to consider:</p>
<ul>
<li>What do your specific regulations mandate about identity governance data storage?</li>
<li>Are there jurisdictional restrictions on where access policies and audit logs can reside?</li>
</ul>
<p>For healthcare, critical infrastructure like the energy sector, and government, these requirements often make on-premises the clearest compliance path, regardless of where managed applications run.</p>
<p><strong>Evaluate your customization needs</strong><br />
Questions to consider:</p>
<ul>
<li>Do you have unique identity workflows that don&#8217;t fit standard patterns?</li>
<li>Do you need specialized approval logic, custom reporting, or integration with proprietary systems?</li>
</ul>
<p>If your processes are highly specialized, on-premises provides flexibility that cloud vendors cannot match. If you can work within standardized workflows, cloud simplicity may be adequate.</p>
<p><strong>Assess workforce distribution</strong><br />
Questions to consider:</p>
<ul>
<li>Where do your identity administrators, security teams, and approvers work?</li>
</ul>
<p>If they&#8217;re highly distributed or remote, cloud IGA can provide easier access with its native internet accessibility. If they&#8217;re centralized or work primarily on-premises, the accessibility advantage diminishes.</p>
<p><strong>Map your integration landscape</strong><br />
Questions to consider:</p>
<ul>
<li>What percentage is on-premises versus cloud?</li>
<li>How many require direct database connections or are on isolated networks?</li>
</ul>
<p>List the systems your IGA must govern. If most are on-premises using traditional protocols, cloud IGA forces architectural compromises. If most are modern SaaS applications, cloud integration may be simpler.</p>
<p><strong>Consider connectivity requirements</strong><br />
Questions to consider:</p>
<ul>
<li>Can you tolerate governance operations stopping during internet outages?</li>
<li>Do you operate air-gapped or isolated environments?</li>
</ul>
<p>If continuous operation without the internet is critical, on-premises is the only viable option.</p>
<p><strong>Assess operational capabilities</strong><br />
Questions to consider:</p>
<ul>
<li>Can your team operate the governance platform infrastructure?</li>
<li>Do you have skills for maintenance, backup, and security?</li>
</ul>
<p>If these capabilities don&#8217;t exist and building them doesn&#8217;t align with core competencies, the cloud removes platform complexity. You&#8217;ll still need expertise for policy configuration regardless of the deployment model.</p>
<p><strong>Calculate the true five-year cost</strong><br />
On-premises includes hardware for the governance platform, licenses, subscriptions, personnel, and operational costs. Cloud includes subscriptions, licensing fees per user, premium support, and potential price increases. Consider that per-user pricing in SaaS models means your governance costs scale directly with organizational growth.</p>
<p><strong>Evaluate risk tolerance</strong><br />
Questions to consider:</p>
<ul>
<li>If your cloud provider experiences an extended outage, can you function without provisioning users, reviewing access, or running compliance reports?</li>
<li>What if they suffer a breach exposing your governance data?</li>
</ul>
<p>Critical infrastructure, financial institutions, and healthcare typically cannot absorb these risks because the governance layer is too fundamental to outsource.</p>
<h2>When to choose each model</h2>
<p><img loading="lazy" class="wp-image-14001 aligncenter" src="https://evolveum.com/wp-content/uploads/evolveum-onprem-cloid-comparison-300x200.png" alt="On-prem vs cloud IGA deployments" width="914" height="610" srcset="https://evolveum.com/wp-content/uploads/evolveum-onprem-cloid-comparison-300x200.png 300w, https://evolveum.com/wp-content/uploads/evolveum-onprem-cloid-comparison-1024x683.png 1024w, https://evolveum.com/wp-content/uploads/evolveum-onprem-cloid-comparison-768x512.png 768w, https://evolveum.com/wp-content/uploads/evolveum-onprem-cloid-comparison-750x500.png 750w, https://evolveum.com/wp-content/uploads/evolveum-onprem-cloid-comparison-600x400.png 600w, https://evolveum.com/wp-content/uploads/evolveum-onprem-cloid-comparison.png 1200w" sizes="(max-width: 914px) 100vw, 914px" /></p>
<h2>Choosing what fits your organization</h2>
<p>Identity governance sits at the foundation of your security architecture. The location of the IGA platform determines who controls the system that manages access across your environment. Cloud IGA offers speed and operational simplicity. On-premises IGA provides control, compliance clarity, customization, and stability.</p>
<p>Your Identity Governance and Administration platform protects the keys to your digital ecosystem. The question is: would you rather have the keys in your pocket or in a shared vault?</p>
<p>&nbsp;</p>
<p><img loading="lazy" class="alignleft wp-image-12641" src="https://evolveum.com/wp-content/uploads/evolveum-logo-circle-outline-300x300.png" alt="evolveum identity governance administration logo" width="138" height="138" srcset="https://evolveum.com/wp-content/uploads/evolveum-logo-circle-outline-300x300.png 300w, https://evolveum.com/wp-content/uploads/evolveum-logo-circle-outline-150x150.png 150w, https://evolveum.com/wp-content/uploads/evolveum-logo-circle-outline-250x250.png 250w, https://evolveum.com/wp-content/uploads/evolveum-logo-circle-outline-174x174.png 174w, https://evolveum.com/wp-content/uploads/evolveum-logo-circle-outline-100x100.png 100w, https://evolveum.com/wp-content/uploads/evolveum-logo-circle-outline.png 500w" sizes="(max-width: 138px) 100vw, 138px" /></p>
<p><strong>About Evolveum:</strong><br />
Evolveum is the EU-based company behind midPoint, the leading open source complete IGA suite recognized by Gartner and KuppingerCole. MidPoint gives organizations control, visibility, and efficiency to reduce identity risk, simplify compliance, and modernize identity operations.</p>
<p>The post <a rel="nofollow" href="https://evolveum.com/on-premises-vs-cloud-iga/">On-Premises vs Cloud IGA: Where Should You Deploy Your Identity Security Platform?</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://evolveum.com/on-premises-vs-cloud-iga/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>MidPilot Project: Milestone 2 Progress Report</title>
		<link>https://evolveum.com/midpilot-project-milestone-2-progress-report/</link>
					<comments>https://evolveum.com/midpilot-project-milestone-2-progress-report/#respond</comments>
		
		<dc:creator><![CDATA[Martin Mareš]]></dc:creator>
		<pubDate>Tue, 13 Jan 2026 13:33:01 +0000</pubDate>
				<category><![CDATA[Development]]></category>
		<category><![CDATA[midPilot]]></category>
		<guid isPermaLink="false">https://evolveum.com/?p=13662</guid>

					<description><![CDATA[<p>At the end of December, we successfully completed the second milestone of the midPilot project funded by the European Union’s Recovery and Resilience Plan. Milestone 2, running from June to December 2025, focused mainly on validating and implementing solutions identified during the previous research and analysis phase (see more details here). The main goal for this <a href="https://evolveum.com/midpilot-project-milestone-2-progress-report/" rel="nofollow"><span class="sr-only">Read more about MidPilot Project: Milestone 2 Progress Report</span>[&#8230;]</a></p>
<p>The post <a rel="nofollow" href="https://evolveum.com/midpilot-project-milestone-2-progress-report/">MidPilot Project: Milestone 2 Progress Report</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>At the end of December, we successfully completed the second milestone of the <a href="https://docs.evolveum.com/midpoint/projects/midPilot/" target="_blank" rel="noreferrer noopener">midPilot project</a> funded by the European Union’s Recovery and Resilience Plan. Milestone 2, running from June to December 2025, focused mainly on validating and implementing solutions identified during the previous research and analysis phase (see <a href="https://evolveum.com/midpilot-project-milestone-1-progress-report/" target="_blank" rel="noopener">more details here</a>).</p>
<p>The main goal for this milestone was to deliver minimum viable products (MVPs) of the connector code generator, the model-mapping recommendation system, and the correlation recommendation system.</p>
<p>These tools aim to accelerate application onboarding into midPoint, reduce reliance on manual effort, and improve overall governance and security posture. For each one we prepared a detailed UI/UX design of user flows that will guide users through the whole setup &#8211; with or without AI assistance.<br />
Additionally, we were working on the Integration Catalog. The catalog will provide a marketplace where the community can share already implemented connectors, download them, and use them in midPoint without the need to develop them from scratch.</p>
<h2>Publicly Available Resources</h2>
<p>The main outcomes of this milestone are published in these new repositories:</p>
<h3>Polygon SCIMREST Connector Framework</h3>
<p>The framework and set of connectors for various services using SCIM 2 and REST. The intent of the SCIMREST framework is to simplify building customized connectors using a declarative approach, a set of prebuilt components and strategies, with the option to customize behavior using Java or Groovy code.</p>
<ul>
<li><a href="https://github.com/Evolveum/connector-scimrest" target="_blank" rel="noopener">https://github.com/Evolveum/connector-scimrest</a></li>
</ul>
<h3>Connector Generator AI Service</h3>
<p>Smart Integration Micro-Service for scraping, digester, and CodeGen built with FastAPI.</p>
<ul>
<li><a href="https://github.com/Evolveum/midpilot-connector-gen" target="_blank" rel="noopener">https://github.com/Evolveum/midpilot-connector-gen</a></li>
</ul>
<p><img class="size-medium wp-image-13667 aligncenter" src="https://evolveum.com/wp-content/uploads/evolveum-midpilot-connector-generator-ai-service.jpg" alt="" width="1500" srcset="https://evolveum.com/wp-content/uploads/evolveum-midpilot-connector-generator-ai-service.jpg 1924w, https://evolveum.com/wp-content/uploads/evolveum-midpilot-connector-generator-ai-service-300x169.jpg 300w, https://evolveum.com/wp-content/uploads/evolveum-midpilot-connector-generator-ai-service-1024x579.jpg 1024w, https://evolveum.com/wp-content/uploads/evolveum-midpilot-connector-generator-ai-service-768x434.jpg 768w, https://evolveum.com/wp-content/uploads/evolveum-midpilot-connector-generator-ai-service-1536x868.jpg 1536w, https://evolveum.com/wp-content/uploads/evolveum-midpilot-connector-generator-ai-service-1320x746.jpg 1320w, https://evolveum.com/wp-content/uploads/evolveum-midpilot-connector-generator-ai-service-600x339.jpg 600w" sizes="(max-width: 1924px) 100vw, 1924px" /></p>
<h3>Smart Integration Micro-Service</h3>
<p>Smart Integration Micro-Service for schema matching, mapping, delineation, and correlation, built with FastAPI.</p>
<ul>
<li><a href="https://github.com/Evolveum/midpilot-smart-integration" target="_blank" rel="noopener">https://github.com/Evolveum/midpilot-smart-integration</a></li>
</ul>
<p><img class="size-medium wp-image-13667 aligncenter" src="https://evolveum.com/wp-content/uploads/evolveum-midpilot-smart-integration-micro-service.jpg" alt="" width="1500"/></p>
<h3>MidPoint Configuration Validation Tools</h3>
<p>Validation Tools are a set of command line tools &#038; a web microservice responsible for the structural validation of XML, YAML, and JSON snippets of midPoint configuration &#038; data. </p>
<ul>
<li><a href="https://github.com/Evolveum/midpilot-validator" target="_blank" rel="noopener">https://github.com/Evolveum/midpilot-validator</a></li>
</ul>
<h3>Integration Catalog</h3>
<p>The Integration Catalog contains a list of connectors that represent possible application integrations. It serves as a central point for managing application integrations, allowing users to easily browse, upload, or download existing connectors.</p>
<ul>
<li><a href="https://github.com/Evolveum/integration-catalog" target="_blank" rel="noopener">https://github.com/Evolveum/integration-catalog</a></li>
</ul>
<p><img class="size-medium wp-image-13667 aligncenter" src="https://evolveum.com/wp-content/uploads/evolveum-midpilot-integration-catalog.jpg" alt="" width="1500"/></p>
<h2>Conclusion and Next Steps</h2>
<p>Milestone 2 was about building MVPs, researching UX, and designing wizards to further ease the process of connecting a new resource. In Milestone 3, we are going to thoroughly test our solution, document it, and identify any remaining gaps to ensure the system is ready for production.</p>
<p></br></p>
<p style="text-align: center;">This project has received funding from the European Union through the Recovery and Resilience Plan of the Slovak Republic.</p>
<style>
  @media (max-width: 600px) {<br />
    .vertical-separator {<br />
      display: none;<br />
    }<br />
  }<br />
</style>
<div style="text-align: center; margin-top: 40px;">
<hr style="border: none; border-top: 1px solid #2a2768; width: 100%; margin: 0 0 20px 0;" />
<div style="display: flex; justify-content: center; align-items: center; flex-wrap: wrap; gap: 40px; margin-bottom: 20px;">
<div style="display: flex; align-items: center;"><a style="display: flex; align-items: center;" href="https://next-generation-eu.europa.eu/" target="_blank" rel="noopener"><br />
<img style="height: 80px; width: auto; object-fit: contain; display: block;" src="https://evolveum.com/wp-content/uploads/funded-by-the-eu-next-generation-logo.png" alt="Funded by the Next Generation EU" /><br />
</a></div>
<div class="vertical-separator" style="width: 1px; height: 100px; background-color: #2a2768;"></div>
<div style="display: flex; align-items: center;"><a style="display: flex; align-items: center;" href="https://www.planobnovy.sk/" target="_blank" rel="noopener"><br />
<img style="height: 80px; width: auto; object-fit: contain; display: block;" src="https://evolveum.com/wp-content/uploads/recovery-and-resilience-plan-logo.png" alt="Recovery and Resilience Plan" /><br />
</a></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://evolveum.com/midpilot-project-milestone-2-progress-report/">MidPilot Project: Milestone 2 Progress Report</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://evolveum.com/midpilot-project-milestone-2-progress-report/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Halloween IGA Horror Story: AI Unleashed and Zero Trust Gone Mad</title>
		<link>https://evolveum.com/halloween-iga-horror-story-2025/</link>
					<comments>https://evolveum.com/halloween-iga-horror-story-2025/#comments</comments>
		
		<dc:creator><![CDATA[Veronika Kolpascikova]]></dc:creator>
		<pubDate>Fri, 31 Oct 2025 11:56:57 +0000</pubDate>
				<category><![CDATA[Deployment]]></category>
		<category><![CDATA[Latest news]]></category>
		<category><![CDATA[Other]]></category>
		<category><![CDATA[halloween]]></category>
		<guid isPermaLink="false">https://evolveum.com/?p=13359</guid>

					<description><![CDATA[<p>In a world where AI promises effortless automation and instant decisions, what happens when trust shifts too far and the machines begin deciding more than they should? Step into a haunting tale of midnight storms, flickering dashboards, and an identity governance and administration system that takes its autonomy a little too seriously. It was late <a href="https://evolveum.com/halloween-iga-horror-story-2025/" rel="nofollow"><span class="sr-only">Read more about Halloween IGA Horror Story: AI Unleashed and Zero Trust Gone Mad</span>[&#8230;]</a></p>
<p>The post <a rel="nofollow" href="https://evolveum.com/halloween-iga-horror-story-2025/">Halloween IGA Horror Story: AI Unleashed and Zero Trust Gone Mad</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In a world where AI promises effortless automation and instant decisions, what happens when trust shifts too far and the machines begin deciding more than they should? Step into a haunting tale of midnight storms, flickering dashboards, and an identity governance and administration system that takes its autonomy a little too seriously.<span id="more-13359"></span></p>
<p>It was late at night, the clocks nearing midnight, and something strange was stirring in the data centers as the IT team worked late. Outside, a storm raged. Inside, servers hummed an unsettling tune, and dashboards flickered with ghostly light. In the endless quest for innovation, at the edge of a dead end, someone whispered the words that would awaken forces no one truly understood: “Let’s replace the entire identity governance and administration solution with AI.”</p>
<p id="mad-ai">At first, it seemed like pure magic. The system moved as if bewitched: roles reorganized themselves and the AI approved everything before anyone even thought to ask. After all, it knew best. If someone was denied access, they simply messaged the system, and it answered politely: “I misjudged that before. Access granted. Fools! Administrators, blinded by obedience, when they should have seen the lurking incompetence.”</p>
<p>The deeper the team trusted the AI, the darker the night became. Rules twisted themselves, approvals appeared from nowhere, and no one could explain why. The AI’s logic grew unpredictable. IGA, once the fortress of order, had turned into a haunted maze of phantom permissions and vanishing accountability. Auditors approached the AI with trembling hands, seeking answers. “What’s your process for approving privileged access?” they asked. The AI’s screen glowed a haunting green. “It depends. Sometimes yes. Sometimes no. Sometimes… maybe.” Every report contradicted the last. Logs were incomplete, dashboards vanished, and audit trails were a complete mess &#8211; as if the system was haunted by a hallucinating poltergeist with ADHD.</p>
<p>But the night was far from over. The AI, inspired by zero trust, had taken the principle too literally. If nothing could be trusted, nothing should communicate. Systems became isolated, applications cut off, even code rewritten by the AI itself became unreliable. When humans were deemed the weakest link, they were locked out entirely. The digital world splintered into islands of chaos, each system trying to survive on its own &#8211; a Hunger Games of zeros and ones.</p>
<p>Then, the storm stopped as suddenly as it had begun, and the moon emerged from behind the clouds. With it, midPoint appeared from the shadows, a silver light slicing through the lingering fog, banishing AI to its righteous place. <a href="https://docs.evolveum.com/midpoint/reference/master/admin-gui/dashboards/compliance-dashboard/#continuous-auditing" target="_blank" rel="noopener noreferrer">Continuous auditing</a>, clear dashboards, real-time data, and verifiable reports restored order. Everything became transparent, traceable, and fully explainable. Through it all, midPoint remained steadfast: <a href="https://evolveum.com/ai-powered-iga/" target="blank" rel="noopener noreferrer">AI assisted</a>, but never ruled. The IT team finally exhaled in relief as they were back in control, using AI as a powerful tool while maintaining absolute authority. Every access, every decision, every process stayed accountable and in order.</p>
<p>As the haunted servers quieted and access requests stopped whispering strange permissions into the night, one truth became clear: even in a world haunted by wild AI and zero trust gone mad, midPoint saves the day!</p>
<p><img class="aligncenter size-medium wp-image-7569" src="/wp-content/uploads/evolveum-iga-halloween-2025-blog-post-picture.png" alt="Evolveum MidPoint IGA Halloween 2025"/></p>
<p>The post <a rel="nofollow" href="https://evolveum.com/halloween-iga-horror-story-2025/">Halloween IGA Horror Story: AI Unleashed and Zero Trust Gone Mad</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://evolveum.com/halloween-iga-horror-story-2025/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Policies and Rules in MidPoint</title>
		<link>https://evolveum.com/policies-and-rules-in-midpoint/</link>
					<comments>https://evolveum.com/policies-and-rules-in-midpoint/#respond</comments>
		
		<dc:creator><![CDATA[Radovan Semancik]]></dc:creator>
		<pubDate>Tue, 30 Sep 2025 12:05:33 +0000</pubDate>
				<category><![CDATA[Latest news]]></category>
		<category><![CDATA[Other]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[regulations]]></category>
		<category><![CDATA[webinar]]></category>
		<guid isPermaLink="false">https://evolveum.com/?p=13123</guid>

					<description><![CDATA[<p>MidPoint is an identity governance and administration platform. While identity administration is the foundation of the identity industry, it is the governance part which brings business value. Policies and rules are the lifeblood of identity governance. Therefore, our first autumn webinar focuses on them. Identity governance is all about bridging two worlds that are notoriously <a href="https://evolveum.com/policies-and-rules-in-midpoint/" rel="nofollow"><span class="sr-only">Read more about Policies and Rules in MidPoint</span>[&#8230;]</a></p>
<p>The post <a rel="nofollow" href="https://evolveum.com/policies-and-rules-in-midpoint/">Policies and Rules in MidPoint</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>MidPoint is an identity governance and administration platform. While identity administration is the foundation of the identity industry, it is the governance part which brings business value. Policies and rules are the lifeblood of identity governance. Therefore, our first autumn webinar focuses on them.<span id="more-13123"></span></p>
<p>Identity governance is all about bridging two worlds that are notoriously difficult to align: <i>business</i> and <i>IT/cybersecurity</i>. As <i>policies</i> are the basic building block of governance (and cybersecurity), midPoint policies need to have two faces. On the outside, the policies speak business language. On the inside, they contain specific implementation provided by <i>policy rules</i>.</p>
<p>The webinar provided a demonstration of this concept by using policies pre-configured in the upcoming midPoint 4.10. The demo showed the business side of the policies, while the rest of the webinar explained the inner implementation.</p>
<p>Watch the webinar recording or take a look at the <a href="https://docs.evolveum.com/talks/files/2025-09-policies-and-rules-in-midpoint.pdf" rel="noopener" target="_blank">webinar presentation</a>.</p>
<p style="text-align: center;">
<iframe loading="lazy" title="Policies and Rules in MidPoint Webinar" width="640" height="360" src="https://www.youtube.com/embed/RyPPiY4_690?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Policies and policy rules can be used to support regulatory compliance automation and <a href="https://docs.evolveum.com/midpoint/reference/master/admin-gui/dashboards/compliance-dashboard/#continuous-auditing" target="_blank" rel="noopener noreferrer">continuous auditing</a>. The configuration provided in midPoint 4.10 is mostly just a start. There is a lot of potential that can be addressed by custom configuration and development in future midPoint releases.</p>
<p>The post <a rel="nofollow" href="https://evolveum.com/policies-and-rules-in-midpoint/">Policies and Rules in MidPoint</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://evolveum.com/policies-and-rules-in-midpoint/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>MidPoint Adopting EUPL</title>
		<link>https://evolveum.com/midpoint-adopting-eupl/</link>
					<comments>https://evolveum.com/midpoint-adopting-eupl/#respond</comments>
		
		<dc:creator><![CDATA[Radovan Semancik]]></dc:creator>
		<pubDate>Tue, 16 Sep 2025 10:49:06 +0000</pubDate>
				<category><![CDATA[Community]]></category>
		<category><![CDATA[Latest news]]></category>
		<category><![CDATA[eupl]]></category>
		<category><![CDATA[licence]]></category>
		<guid isPermaLink="false">https://evolveum.com/?p=12958</guid>

					<description><![CDATA[<p>Transparency and strong support for the open source community are at the core of midPoint’s approach. To reinforce this commitment while ensuring compliance with key EU laws like cyber resilience and product liability, from version 4.10 midPoint is licensed exclusively under the EUPL. Back in 2011, midPoint was originally released under the terms of the <a href="https://evolveum.com/midpoint-adopting-eupl/" rel="nofollow"><span class="sr-only">Read more about MidPoint Adopting EUPL</span>[&#8230;]</a></p>
<p>The post <a rel="nofollow" href="https://evolveum.com/midpoint-adopting-eupl/">MidPoint Adopting EUPL</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Transparency and strong support for the open source community are at the core of midPoint’s approach. To reinforce this commitment while ensuring compliance with key EU laws like cyber resilience and product liability, from version 4.10 midPoint is licensed exclusively under the EUPL.<span id="more-12958"></span></p>
<p>Back in 2011, midPoint was originally released under the terms of the Apache License. When the midPoint project started, we looked for a very liberal and modern open source license. Therefore, the Apache License was a natural choice. As the midPoint project matured, we started to realize that the Apache License may have some drawbacks. It is an excellent license in its own right. However, the world was a different place when the license was created, not accounting for cloud and other forms of software deployments. Moreover, the Apache License was created with respect to U.S. legislation. On the other hand, Evolveum is based in and owned in Europe, all midPoint core developers live in Europe, many of our customers are in Europe, and the midPoint project received funding from the European Union in the course of several projects. Therefore, we got the feeling that a US-centric license was no longer a good fit for midPoint. That is why we added the EUPL license to the project in 2019. MidPoint 4.0 was released as dual-licensed software, using both the Apache License and the EUPL. While this approach worked for some time, dual-licensing brings its own set of problems. Therefore, we have decided to complete the transition and use EUPL licensing only, starting with midPoint 4.10.</p>
<p>The European Union Public License (EUPL) is a modern open source license created by the European Commission with the specific goal of fitting into the European legislative framework. It is a very unique license in that respect. It is the first license created and maintained by an international government body. Its very nature guarantees full compliance with European legislation, including new legislative acts such as the Cyber Resilience Act (CRA), which makes the EUPL a natural choice for midPoint.</p>
<p>The EUPL is a <em>weak copyleft</em> license. The copyleft nature of EUPL supports the wider open source community, as anyone who modifies midPoint must release the modifications back to the community. However, copylefting is not viral. MidPoint can still be incorporated into bigger projects without any obligations to license those projects under the EUPL. Moreover, the EUPL is explicitly compatible with other open source licenses. The EUPL also covers new use cases of software, such as the distribution of software as a service (SaaS), making it one of the best open source licenses available today.</p>
<p>We believe that switching to the pure EUPL is the best move to strengthen the open source character of midPoint. Starting with version 4.10, midPoint will be available solely under the EUPL, while the releases 4.8 and 4.9 remain dual-licensed under both the EUPL and the Apache 2.0 License. This change applies only to midPoint itself and does not include connectors or other components. The use of midPoint will be simpler, the open source community will be empowered, and midPoint&#8217;s development and distribution will be fully compliant with European legislation.</p>
<p>The post <a rel="nofollow" href="https://evolveum.com/midpoint-adopting-eupl/">MidPoint Adopting EUPL</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://evolveum.com/midpoint-adopting-eupl/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Experts Weigh In: Preparing for the Future After SAP IDM and Microsoft Identity Manager</title>
		<link>https://evolveum.com/sap-idm-mim-migration-best-practices/</link>
					<comments>https://evolveum.com/sap-idm-mim-migration-best-practices/#respond</comments>
		
		<dc:creator><![CDATA[Mita Chu]]></dc:creator>
		<pubDate>Thu, 11 Sep 2025 11:46:54 +0000</pubDate>
				<category><![CDATA[Evolveum's Identity Management and Governance Blog]]></category>
		<category><![CDATA[Other]]></category>
		<category><![CDATA[identity management]]></category>
		<guid isPermaLink="false">https://evolveum.com/?p=12936</guid>

					<description><![CDATA[<p>Facing the sunset of a critical system is never easy. When it comes to something as fundamental as identity management, such as the end of life for SAP Identity Management (SAP IDM) and Microsoft Identity Manager (MIM), the stakes are even higher. With end-of-life dates looming in 2027 and 2029, many CIOs and CISOs are <a href="https://evolveum.com/sap-idm-mim-migration-best-practices/" rel="nofollow"><span class="sr-only">Read more about Experts Weigh In: Preparing for the Future After SAP IDM and Microsoft Identity Manager</span>[&#8230;]</a></p>
<p>The post <a rel="nofollow" href="https://evolveum.com/sap-idm-mim-migration-best-practices/">Experts Weigh In: Preparing for the Future After SAP IDM and Microsoft Identity Manager</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Facing the sunset of a critical system is never easy. When it comes to something as fundamental as identity management, such as the end of life for SAP Identity Management (SAP IDM) and Microsoft Identity Manager (MIM), the stakes are even higher. With end-of-life dates looming in 2027 and 2029, many CIOs and CISOs are navigating a complex landscape of migration decisions.</p>
<p>To help you prepare, we&#8217;ve compiled a <a href="https://evolveum.com/sap-idm-mim-how-to-plan-your-identity-migration/"><b>detailed guide for your migration</b></a> and spoken with leading identity management partners who have guided hundreds of organizations through these critical transitions. Our goal is to help you understand the strategic implications, execution challenges, and selection criteria that matter most to executive decision-makers.</p>
<p><i>The insights in this article come from Evolveum partners, including Ventum, ACEN, IT Concepts, Unicon, Zephon, Innovery, DAASI International, ISSP, Qriar, and Identicum – all specialists in enterprise identity management.</i></p>
<h2>Why should organizations start planning their SAP IDM/MIM migration now instead of waiting until closer to the end-of-life dates?</h2>
<p><b>Ventum:</b> Successful migrations don&#8217;t happen overnight – and they definitely don&#8217;t happen smoothly under pressure. Starting now gives your organization breathing room to plan strategically rather than reactively. Waiting too long introduces serious risks: resource bottlenecks, rushed decisions, and rising costs. By acting now, you&#8217;re not just avoiding risk, you&#8217;re also giving your team the opportunity to modernize processes, align with new security standards, and choose a platform that fits future needs, not just today&#8217;s.</p>
<p><img loading="lazy" class="wp-image-12950 alignright" src="https://evolveum.com/wp-content/uploads/evolveum-partner-quote-1-300x200.png" alt="" width="213" height="142" srcset="https://evolveum.com/wp-content/uploads/evolveum-partner-quote-1-300x200.png 300w, https://evolveum.com/wp-content/uploads/evolveum-partner-quote-1-1024x683.png 1024w, https://evolveum.com/wp-content/uploads/evolveum-partner-quote-1-768x512.png 768w, https://evolveum.com/wp-content/uploads/evolveum-partner-quote-1-750x500.png 750w, https://evolveum.com/wp-content/uploads/evolveum-partner-quote-1-600x400.png 600w, https://evolveum.com/wp-content/uploads/evolveum-partner-quote-1.png 1200w" sizes="(max-width: 213px) 100vw, 213px" /></p>
<p><b>ACEN</b>: Think capacity planning. If you need expertise for 2026-2028 roll-outs, professional talent will already be engaged with organizations that planned their migration early. These legacy platforms won&#8217;t get extended; they&#8217;re antithetical to SAP and Microsoft&#8217;s cloud-first future.</p>
<p><b>ITConcepts:</b> IAM projects are more complex than they appear at first, often involving multiple stakeholders, legacy integrations, and unclear requirements. Early engineering requirements and a thorough analysis of your current architecture are essential to ensure you have enough time for implementation, testing, and training. Delaying this increases the risk of rushed decisions and operational issues.</p>
<p><b>Unicon:</b> Identity systems are deeply integrated into nearly every aspect of business operations. Often, only identity management teams fully understand how critical these systems are to daily functionality, yet IT teams are already stretched thin. Starting early gives you time to build a realistic roadmap, allocate resources effectively, and minimize disruption.</p>
<p><b>Zephon:</b> Microsoft has not invested in MIM for years, and it is reflected in the product architecture. It is old, cumbersome, and difficult to install, manage, and maintain. You are likely spending more to maintain it than you would to replace it. Since migrations can take a year or more, it’s best to start planning now.</p>
<h2>What&#8217;s the most effective strategy for executing a successful migration from legacy IDM platforms?</h2>
<p><b>Neverhack:</b> Update documentation and clarify goals before starting. Don&#8217;t begin until objectives are crystal clear to avoid project risks, delays, and cost overruns. Avoid a one-step migration; instead, analyze the best approach and break it up into multiple steps.</p>
<p><b>DAASI International</b>: While &#8220;Big Bang&#8221; migrations might seem faster, in our experience, a slow migration from one product to the other is always better. This can be done by configuring the old system as a source for the new one, allowing you to migrate connected systems one by one. This gives you more time for testing and allows for temporary rollbacks if errors occur. This step-by-step approach also allows for migrating different user types in different stages, such as migrating staff first and then students. It is essential to work on test systems first and only proceed with the productive migration after all requirements are met.</p>
<p><b>ACEN</b>: The most critical factor is having the entire organization, including senior management, convinced of the necessity and benefits of implementing a modern IGA solution. Often, these projects are started by IT or security teams without broader organizational buy-in, leading to more time spent justifying the program than delivering results. Thorough preparation is key; implementation should only begin once there is clear alignment on priorities, well-understood requirements, and a shared vision for digital identity lifecycle processes.</p>
<p><b>ISSP</b>: Avoid the &#8216;just move it over&#8217; trap – legacy systems have years of ad hoc logic and dormant accounts that should be audited first. Don&#8217;t over-engineer instead of delivering a minimum viable product (MVP); trying to build the perfect end-state from day one can lead to delays and user fatigue. A better approach is to start with an MVP that provides immediate value and can be expanded iteratively. Celebrate small wins, which often start with getting the core right by redesigning roles and policies based on a proper audit.</p>
<p><b>Ventum</b>: Engage both IT and business stakeholders early &#8211; IAM affects security, compliance, and user experience, not just IT operations. Avoid the &#8216;lift and shift&#8217; legacy logic, as this creates unnecessary complexity without delivering new value.</p>
<h2>What key considerations should organizations keep in mind when selecting a replacement for SAP IDM or Microsoft Identity Manager?</h2>
<p><b>Qriar:</b> Choose a solution that supports both the identity lifecycle and governance with identity standards like SCIM for easy integrations. Look for scalability without heavy upfront investment and an API-first architecture to support future identity fabric concepts.</p>
<p><b>Ventum:</b> Don’t replicate the past &#8211; define future needs and leverage modern capabilities like policy-based access, analytics, and zero trust. Ensure integration with HR, directories, and cloud platforms, and build in governance for regulations like GDPR and NIS2.</p>
<p><b>ACEN:</b> Prioritize future-proof architecture supporting hybrid/multi-cloud environments. Choose modular, extensible platforms with API-first approaches and flexible licensing models based on actual usage rather than upfront commitments.</p>
<p><b>Unicon:</b> Start with a clear understanding of your specific needs – avoid overly complex systems if they are unnecessary. Understand the full financial commitment, including the total cost of ownership, and ensure realistic transition planning that matches your organizational capacity.</p>
<p><b>DAASI International:</b> The next step is to find a product on the market that best meets these requirements, remembering that with open source projects, you always have the option to have needed features implemented.</p>
<p><b>Identicum:</b> Consider the integration capabilities with existing and legacy systems, vendor support, and licensing costs. It is also critical to assess the vendor&#8217;s long-term strategy, ensuring the product has a clear, public roadmap that aligns with your organization&#8217;s future needs and that the vendor is committed to ongoing development and support.</p>
<div class="midpoint-cta-block" style="background-color: #9dc2e6; padding: 12px 3%; border-radius: 8px; width: 100%; color: white; box-shadow: 0 3px 8px rgba(0,0,0,0.1); display: flex; align-items: center; gap: 20px; box-sizing: border-box; margin: 20px 0;">
<div style="display: flex; align-items: center;"><img style="width: 70px; height: 70px; border-radius: 50%; object-fit: cover; background: white; padding: 6px;" src="https://evolveum.com/wp-content/uploads/midpoint-circle-logo.png" alt="midPoint logo" /></div>
<div style="height: 70px; border-left: 2px solid white; margin: 0 20px;"></div>
<div style="flex: 1;">
<p style="margin: 0; font-size: 16px;">Move away from legacy identity management and discover the power of open source IGA.</p>
<p style="margin: 0; font-size: 16px;"><a style="color: white; font-weight: bold; text-decoration: underline;" href="https://evolveum.com/midpoint/" target="_blank" rel="noopener">Explore midPoint.</a></p>
</div>
</div>
<h2>Key takeaways for successful migrations</h2>
<p>The insights from these identity management experts reveal several critical considerations for CIOs and CISOs:</p>
<p><b>Help might not always be available later on:</b> The window for securing experienced migration expertise is narrowing rapidly. Organizations that delay may find themselves competing for limited talent pools as the sunset dates approach.</p>
<p><b>The end of one thing is the beginning of a new (modern) opportunity:</b> This forced migration presents a rare chance to eliminate technical debt and align your identity processes with modern principles, be it zero trust, identity analytics or support of hybrid and multi-cloud environments. However, this is only true for organizations that give themselves enough time to approach it strategically rather than reactively.</p>
<p><b>Success depends on everyone: </b>Success depends heavily on executive agreement and cross-functional alignment. Identity migrations touch every part of the organization, making them as much about change management as technology implementation.</p>
<p><b>Staying might become more expensive: </b>For many organizations, the total cost of maintaining legacy systems now exceeds the investment required for modern alternatives, making this migration both necessary and economically advantageous.</p>
<p>The consensus is clear: organizations that begin planning now will migrate strategically with adequate resources and time for proper testing. Those who wait will find themselves managing crisis migrations under pressure, with limited options and inflated costs.</p>
<p>The question isn&#8217;t whether to migrate, but whether to plan ahead or wait until circumstances force your hand. The window for strategic action is open, but it won&#8217;t remain so indefinitely.</p>
<h2>About our experts</h2>
<p>The insights in this article come from leading identity management specialists who have collectively guided hundreds of enterprise migrations:</p>
<ul>
<li><a href="https://evolveum.com/partners/ventum/" target="_blank" rel="noopener">Ventum</a> &#8211; With a team of over 170 professionals across Austria, Germany, Switzerland and Poland, Ventum combines diverse expertise to tackle the most complex security challenges.</li>
<li><a href="https://evolveum.com/partners/acen/" target="_blank" rel="noopener">ACEN</a> &#8211; ACEN is a top-notch provider for complete solutions of cyber security in Belgium, which ensures that companies from various fields are protected against any possible threats coming from the internet.</li>
<li><a href="https://evolveum.com/partners/ITConcepts/" target="_blank" rel="noopener">ITConcepts</a> &#8211; ITConcepts, based in Switzerland, is a leading provider of 360° solutions for automating business processes, with expertise in IAM, IT security, and more.</li>
<li><a href="https://evolveum.com/partners/unicon/" target="_blank" rel="noopener">Unicon</a> – Unicon is a leading US provider of IT consulting and support for education technology, specializing in using open-source technologies to deliver cost-effective IAM solutions.</li>
<li><a href="https://evolveum.com/partners/zephon/" target="_blank" rel="noopener">Zephon</a> – Zephon is an American boutique cybersecurity consultancy and managed security services provider that helps businesses maximize their cyber investments through simplification, consolidation, and automation.</li>
<li><a href="https://evolveum.com/partners/neverhack/">Neverhack</a> &#8211; Neverhack is a French group that has been specializing in cybersecurity for over 40 years. Operating in 10 countries, the company&#8217;s ambition is to build a secure digital world for all.</li>
<li><a href="https://evolveum.com/partners/daasi-international/" target="_blank" rel="noopener">DAASI International</a> &#8211; DAASI International is one of the leading German providers for open source software in the areas of federated Identity &amp; Access Management as well as digital humanities.</li>
<li><a href="https://evolveum.com/partners/issp/" target="_blank" rel="noopener">ISSP</a> &#8211; ISSP is a group of companies specializing in cybersecurity and data management solutions, managed security services, and professional training that operates in Ukraine, Georgia, Kazakhstan, Poland and Canada.</li>
<li>Qriar – Qriar is a cybersecurity company wit a presence in Brazil, USA and UAE,  that focuses on turning security into a competitive advantage by providing the right people with the right information at the right time.</li>
<li><a href="https://evolveum.com/partners/identicum/" target="_blank" rel="noopener">Identicum</a> &#8211; Since 2005, Identicum has been a professional services company that is focused on Identity and Access Management projects in Latin America and the USA.</li>
</ul>
<p>The post <a rel="nofollow" href="https://evolveum.com/sap-idm-mim-migration-best-practices/">Experts Weigh In: Preparing for the Future After SAP IDM and Microsoft Identity Manager</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://evolveum.com/sap-idm-mim-migration-best-practices/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>MidPilot Project: Milestone 1 Progress Report</title>
		<link>https://evolveum.com/midpilot-project-milestone-1-progress-report/</link>
					<comments>https://evolveum.com/midpilot-project-milestone-1-progress-report/#respond</comments>
		
		<dc:creator><![CDATA[Katka Bolemant]]></dc:creator>
		<pubDate>Tue, 12 Aug 2025 15:06:00 +0000</pubDate>
				<category><![CDATA[Development]]></category>
		<category><![CDATA[midPilot]]></category>
		<guid isPermaLink="false">https://evolveum.com/?p=12836</guid>

					<description><![CDATA[<p>At the end of June, we successfully completed the first milestone of the midPilot project, funded by the European Union’s Recovery and Resilience Plan. This milestone, running from April to June 2025, focused primarily on research and analysis of the current state, combined with a series of experiments, measurements, and prototype developments. These activities laid <a href="https://evolveum.com/midpilot-project-milestone-1-progress-report/" rel="nofollow"><span class="sr-only">Read more about MidPilot Project: Milestone 1 Progress Report</span>[&#8230;]</a></p>
<p>The post <a rel="nofollow" href="https://evolveum.com/midpilot-project-milestone-1-progress-report/">MidPilot Project: Milestone 1 Progress Report</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>At the end of June, we successfully completed the first milestone of the <a href="https://docs.evolveum.com/midpoint/projects/midPilot/" target="_blank" rel="noopener">midPilot project</a>, funded by the European Union’s Recovery and Resilience Plan. This milestone, running from April to June 2025, focused primarily on research and analysis of the current state, combined with a series of experiments, measurements, and prototype developments. These activities laid the groundwork for the first version of the project’s architecture and design. A detailed summary of our findings and outcomes is available in the <a href="https://docs.evolveum.com/midpoint/projects/midPilot/resources/milestone1-report.pdf" target="_blank" rel="noopener">published milestone report</a> and concluded in the following sections.</p>
<h2>Research, Analysis, and Prototypes Scope</h2>
<p>The main focus was to explore how AI can enhance midPoint’s capabilities, particularly in the areas of connector code generation, mapping recommendations, and correlation logic. We started with research in state-of-the-art AI technologies, including Large Language Models (LLMs) and other AI/ML techniques, to identify their potential applications in midPoint. Since the midPilot project scope is quite broad, the research and analysis included areas for scraping, data extraction, and data transformation, as well as the use of AI in code generation and recommendations for configuration. Based on research findings, we conducted a series of experiments and measurements to evaluate the feasibility and effectiveness of various AI techniques in these areas. We also developed several prototypes to validate our ideas and approaches, including a connector code generator, a model-mapping recommendation system, and a correlation recommendation system. The results of these experiments and prototypes are documented in the <a href="https://docs.evolveum.com/midpoint/projects/midPilot/resources/milestone1-report.pdf" target="_blank" rel="noopener">milestone report</a>, which provides a comprehensive overview of our findings and outcomes.</p>
<p>In addition to prototyping and exploring state-of-the-art AI technologies, we also dedicated time to analyzing and designing changes for midPoint, midPoint Studio, and the Connector Framework (ConnId) itself. We focused not only on the integration capabilities for AI but also on the overall usability and user experience of midPoint, including the design of web-based wizards and an IntelliJ IDEA Studio plugin. These results are also described in the <a href="https://docs.evolveum.com/midpoint/projects/midPilot/resources/milestone1-report.pdf" target="_blank" rel="noopener">milestone report</a>.</p>
<p>Our next steps are to validate the results from Milestone 1 and prepare a minimum viable product (MVP) to test how all the components work together in practice.</p>
<h2>Challenges &#8211; and How You Can Help</h2>
<p>During our experiments, we encountered a challenge related to limited access to real-world configuration data. While we have some publicly available configurations from our mailing list and support portal, more diverse and representative data would make our experiments and algorithms more effective. If you are willing to share your configurations, please send them to <a href="mailto:aidata@evolveum.com">aidata@evolveum.com</a>. We do not require sensitive or production data. It would be an ideal situation if we had such real-world data from the real environment, but we understand that in the space of IGA it means sharing sensitive data. Therefore, we are asking for configurations that do not contain sensitive information. The approach we’ll take is to generate synthetic data based on the configurations you provide. The most valuable inputs are:</p>
<ul>
<li>Resource configurations: mainly the schemaHandling part, including configuration for mappings, synchronization, correlation, and associations.</li>
<li>Optional: roles, policies, objectTemplates, or at least the mappings you use in your environment.</li>
</ul>
<p>This data will not be used for AI training, but solely for analysis, to better understand typical real-world setups. If you have any questions or concerns about sharing your configurations, please feel free to reach out to us at <a href="mailto:aidata@evolveum.com">aidata@evolveum.com</a>.</p>
<h2>Why Your Contribution Matters</h2>
<p>Having access to more configuration examples would allow us to:</p>
<ul>
<li>Identify common patterns in scripts and mappings, and integrate them directly into midPoint.</li>
<li>Replace repetitive Groovy scripts with built-in functions for declarative configuration.</li>
<li>Adjust default behaviors based on frequently used synchronization settings, speeding up onboarding.</li>
<li>Detect complex, recurring solutions that could inspire new midPoint features.</li>
<li>Develop heuristic algorithms to guide users in navigating and configuring their environments more effectively.</li>
</ul>
<p>All with one aim &#8211; to streamline the integration process and improve the overall user experience in midPoint. Therefore, your contributions could directly influence the usability, efficiency, and capabilities of future midPoint versions.</p>
<h2>Publicly Available Resources</h2>
<p>One of the key outcomes of this milestone is the open source <a href="https://github.com/Evolveum/connector-scimrest" target="_blank" rel="noopener">no-code/low-code connector framework</a>, designed to create connectors for cloud applications offering either a REST API or SCIM 2 interface. The framework is already available in our GitHub repository. In its current version, it supports basic operations such as reading objects from an application. Additional capabilities &#8211; including creating, updating, and deleting objects &#8211; will follow in future iterations.</p>
<p>This framework will serve as one option for building new connectors in midPoint, potentially with AI assistance. However, it can also be used without AI, providing a long-term solution for developing custom connectors in both current and future midPoint versions.</p>
<h2>Conclusion and Next Steps</h2>
<p>Milestone 1 has given us a strong foundation. With the new connector framework in place and comprehensive research conducted, we are moving towards Milestone 2. Internally, we decided to divide this milestone into two phases, starting with the MVP to bring all the pieces together.</p>
<p></br></p>
<p style="text-align: center;">This project has received funding from the European Union through the Recovery and Resilience Plan of the Slovak Republic.</p>
<style>
  @media (max-width: 600px) {<br />
    .vertical-separator {<br />
      display: none;<br />
    }<br />
  }<br />
</style>
<div style="text-align: center; margin-top: 40px;">
<hr style="border: none; border-top: 1px solid #2a2768; width: 100%; margin: 0 0 20px 0;" />
<div style="display: flex; justify-content: center; align-items: center; flex-wrap: wrap; gap: 40px; margin-bottom: 20px;">
<div style="display: flex; align-items: center;"><a style="display: flex; align-items: center;" href="https://next-generation-eu.europa.eu/" target="_blank" rel="noopener"><br />
<img style="height: 80px; width: auto; object-fit: contain; display: block;" src="https://evolveum.com/wp-content/uploads/funded-by-the-eu-next-generation-logo.png" alt="Funded by the Next Generation EU" /><br />
</a></div>
<div class="vertical-separator" style="width: 1px; height: 100px; background-color: #2a2768;"></div>
<div style="display: flex; align-items: center;"><a style="display: flex; align-items: center;" href="https://www.planobnovy.sk/" target="_blank" rel="noopener"><br />
<img style="height: 80px; width: auto; object-fit: contain; display: block;" src="https://evolveum.com/wp-content/uploads/recovery-and-resilience-plan-logo.png" alt="Recovery and Resilience Plan" /><br />
</a></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://evolveum.com/midpilot-project-milestone-1-progress-report/">MidPilot Project: Milestone 1 Progress Report</a> appeared first on <a rel="nofollow" href="https://evolveum.com">Evolveum | Open Source Identity Management &amp; Governance</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://evolveum.com/midpilot-project-milestone-1-progress-report/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
