- Identity and Access Management
- Book
- MidPoint
- Quick Start Guide
- Compliance
- Installation
- Releases
- Roadmap
- Features
- Architecture
- Security
- Guides
- Developer Zone
- Exercises
- Live Demo
- Operations manual
- Configuration reference
- 4.7 and earlier
- 4.8
- Concepts
- Cases and Approvals
- Simulations
- Smart Correlation
- Expressions and Mappings
- Schema and Archetypes
- Roles and Policies
- Task Management
- Interfaces and Integration
- Organizational Structure
- Resources and Provisioning
- Synchronization
- Configuration Samples
- Administration User Interface
- Upgrade And Migration
- Security
- Diagnostics and Troubleshooting
- Repository
- Deployment and Maintenance
- Clustering / high availability setup
- Deployment Concepts
- High Availability and Load Balancing
- Initial Objects
- Maintaining midPoint Configuration as Files
- MidPoint Home Directory
- Multi-tenancy
- Ninja
- Overlay Project
- Ports 80 and 443
- Post-Initial Import
- Removing obsolete information
- Service Account Management
- Spring Boot Actuator Endpoints
- Stand-Alone Deployment
- Misc
- 4.9
- Development
- MidPrivacy
- MidScale
- MidPoint Studio
- Methodology
- Projects
- Tools
- Versioning
- History
- Identity Connectors
- Support
- Trainings
- Evolveum
- Community
- Library
- Case Studies
- Talks
- Glossary
- Frequently Asked Questions
- About
Use cases
Last modified 11 Mar 2024 12:39 +01:00
Following page describes common use cases for ninja.
Was this page helpful?
YES
NO
Thanks for your feedback