Practical Identity Management with MidPoint

Last modified 16 Nov 2023 15:57 +01:00

This book is all about midPoint. MidPoint is an open source identity management and governance system. It is comprehensive and quite complex system and it takes some time and skill to master it. This book is a guide through the wonderland of identity management and governance with midPoint.

This book is written by engineers for engineers. You will not find sales material or business presentations in this book. It is written by people that develop, maintain and support midPoint. The book starts with an introduction to Identity and Access Management (IAM) concepts, provides overview of midPoint and then it dives down to technical topics.

The book is available in three formats:

The book is available under the terms of Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Book Content

Chapter Title Content
Introduction
1 Understanding Identity and Access Management Introduction to Identity and Access Management world and fundamental concepts. Description of directory services, access management systems, identity and management and governance systems.
2 MidPoint Overview Overview of midPoint functionality and its role in information infrastructure. Simple use case demonstrating how midPoint works from the user/administrator perspective.
3 Installation and Configuration Principles Basic principles of midPoint configuration, installation and deployment. Basic structure of midPoint user interface, configuration objects and installation layout.
4 Resources and Mappings Description of midPoint provisioning (fulfillment) capabilities. Connecting midPoint to target system by configuring midPoint resources.
5 Synchronization Synchronization of data from source systems. Live synchronization, reconciliation and synchronization tasks.
6 Schema MidPoint data model, structure of midPoint objects. Extending the schema with custom properties.
7 Role-Based Access Control Using roles and role hierarchies to organize access control. Role assignments and meta-roles.
8 Object Templates Using object templates to automatically compute object properties and automate identity management.
9 Organizational Structures The usual divisions, department and sections, but also teams, projects and workgroups. Organizational structure synchronization.
10 Troubleshooting How to find a problem when the configuration does not behave as expected. MidPoint diagnostic mechanisms.
11 MidPoint Development, Maintenance and Support Overview of midPoint development and support practices.
12 Additional Information Pointers to additional information about midPoint.
To Be Continued The book is still not finished. Description of chapters to write.
Conclusion
Glossary Glossary of identity and access management terms.

Videos

The book is accompanied by a series of video tutorials. There is one video corresponding to each of the book chapters that deal with MidPoint configuration.

Video Corresponding book chapter Content
Deployment and Overview Chapter 2 Overview of midPoint functionality and its role in information infrastructure. Simple use case demonstrating how midPoint works from the user/administrator perspective.
Resources and Mappings Chapter 4 Description of midPoint provisioning (fulfillment) capabilities. Connecting midPoint to target system by configuring midPoint resources.
Synchronization Chapter 5 Synchronization of data from source systems. Live synchronization, reconciliation and synchronization tasks.
Schema Chapter 6 MidPoint data model, structure of midPoint objects. Extending the schema with custom properties.
Role-Based Access Control Chapter 7 Using roles and role hierarchies to organize access control. Role assignments and meta-roles.
Object Templates Chapter 8 Using object templates to automatically compute object properties and automate identity management.
Was this page helpful?
YES NO
Thanks for your feedback