MidPoint Synchronization
Synchronization feature
This page is an introduction to Synchronization midPoint feature.
Please see the feature page for more details.
|
For an introduction to the topic, please see the MidPoint Synchronization Introduction page.
Following pages describe midPoint identity synchronization mechanisms.
- Introduction
- Correlation and Confirmation Expressions
- Examples
- Flavors
- Generic Synchronization
- Linked Objects
- Policies
- Projection Policy
- Provisioning consistency
- Situations
- Synchronization Sorter
This is part of MidPoint Configuration Reference. Being a reference documentation, these documents focus on breadth and depth of information rather than seamless readability. New midPoint users may find this information hard to follow and confusing.
It is recommended that new midPoint users start with MidPoint Book or video tutorials on Evolveum YouTube channel.
Compliance
This feature is related to the following compliance frameworks:
-
ISO/IEC 27001 5.9: Inventory of information and other associated assets
-
ISO/IEC 27001 5.24: Information security incident management planning and preparation
-
ISO/IEC 27001 5.26: Response to information security incidents
-
ISO/IEC 27001 5.27: Learning from information security incidents
-
ISO/IEC 27001 6.5: Responsibilities after termination or change of employment
-
ISO/IEC 27001 8.14: Redundancy of information processing facilities
-
ISO/IEC 27001 8.19: Installation of software on operational systems
-
ISO/IEC 27001 8.27: Secure system architecture and engineering principles
-
ISO/IEC 27001 8.31: Separation of development, test and production environments