Site Map
- Identity and Access Management
- Access Management and Provisioning
- Business Benefits of Identity Management
- Enterprise Identity and Access Management
- Identity Governance and Administration
- Identity Lifecycle Management
- Entitlement Management
- Fulfillment
- Synchronization
- Policy and Role Management
- Access Requests
- Identity Workflow Automation
- Access Certification
- Auditing
- Identity Analytics and Reporting
- IGA Capabilities Summary
- What is Identity Governance?
- Identity Management for Dummies
- Identity Management Project
- Identity Provisioning
- IDM Consistency
- LDAP Survival Guide
- Provisioning Standards
- RBAC
- Role Explosion
- Best Practice
- Antipatterns
- Book
- MidPoint
- Quick Start Guide
- Installation
- From Distribution Package
- Using Docker Image
- Using Docker Image
- Alpine based docker image
- Book demo
- Clustering demo
- External repository demo
- Native repository demo
- PostgreSQL demo
- Simple demo
- From Source Code
- Kubernetes
- Platform Support
- Running With systemd
- Start script
- System Requirements
- Using Support Branch
- Windows Service Setup
- Deploying as Web Application
- Releases
- MidPoint 4.8
- MidPoint 4.7.2
- MidPoint 4.7.1
- MidPoint 4.7
- MidPoint 4.6.1
- MidPoint 4.6
- MidPoint 4.5
- MidPoint 4.4.6
- MidPoint 4.4.5
- MidPoint 4.4.4
- MidPoint 4.4.3
- MidPoint 4.4.2
- MidPoint 4.4.1
- MidPoint 4.4
- MidPoint 4.3.2
- MidPoint 4.3.1
- MidPoint 4.3
- MidPoint 4.2
- MidPoint 4.1
- MidPoint 4.0.4
- MidPoint 4.0.3
- MidPoint 4.0.2
- MidPoint 4.0.1
- MidPoint 4.0
- MidPoint 3.9.1
- MidPoint 3.9
- MidPoint 3.8
- MidPoint 3.7.2
- MidPoint 3.7.1
- MidPoint 3.7
- MidPoint 3.6.1
- MidPoint 3.6
- MidPoint 3.5.1
- MidPoint 3.5
- MidPoint 3.4.1
- MidPoint 3.4
- MidPoint 3.3.1
- MidPoint 3.3
- MidPoint 3.2
- MidPoint 3.1.1
- MidPoint 3.1
- MidPoint 3.C
- MidPoint 3.0
- MidPoint 2.2.1
- MidPoint 2.2
- MidPoint 2.1.1
- MidPoint 2.1
- MidPoint 2.0
- MidPoint 1.10
- MidPoint 1.9
- MidPoint 1.8
- MidPoint 1.7
- Roadmap
- Features
- Unique Features
- Current Features
- Repository Database Support
- Access Certification
- Approval
- Archetypes
- Assignment
- Asynchronous (Messaging) Inbound Resources
- Asynchronous (Messaging) Outbound Resources
- Attribute Caching
- Auditing
- Authorization
- Auxiliary Object Classes
- Bulk Actions
- Common Data Model
- Consistency mechanism
- Constants
- Custom forms
- Dashboards
- Deputy
- Entitlements
- Expression Profiles
- Flexible Authentication
- Function Libraries
- Generic Objects
- Generic Synchronization
- High Availability and Load Balancing
- Iteration
- Linked Objects
- Localization
- Lookup Tables
- Manual Resource and ITSM Integration
- Mappings and Expressions
- Matching Rules
- Meta-roles
- Multi-Connector Resource
- Multi-tenancy
- Notifications
- Object Collections and Views
- Object Lifecycle
- Object Marks
- Object Template
- Password Policy
- Personas
- Policy Rules
- Policy-based approvals
- Policy-Driven RBAC
- PolyString
- Prism
- Protected Accounts
- Provisioning Dependencies
- Provisioning Propagation
- RBAC
- Relativity
- Resource Maintenance State
- REST API
- Role Autoassignment
- Role Catalog
- Role Lifecycle
- Role Request and Shopping Cart
- Sections (virtual containers) in object details
- Segregation of Duties
- Sequences
- Service Account Management
- Services
- Simulations
- Smart Correlation
- Spring Boot Actuator Endpoints
- Stand-Alone Deployment
- Subtype
- Synchronization
- Thresholds
- User-Friendly Policy Selection
- Workflowless
- Planned Features
- Archetype Improvements
- Case Management Improvements
- Complete Relativity
- Compliance
- Consent Management (GDPR)
- Data Provenance Rollout
- Expression Profiles: Full Implementation
- External Workflow Integration
- Flexible Authentication Improvements
- Localization Improvements
- Management of Lawful Bases for Data Processing (GDPR)
- Manual Correlation
- Messaging API
- Messaging Resources
- Object Collections and Views Improvements
- PolyString Improvements
- Power of Attorney
- Recent Errors
- Remediation
- Retirement of Roles
- Script Expression Sandboxing
- Service Account Management Improvements
- Misc Ideas
- Feature Synergy
- Architecture
- Archive
- Data Model
- Misc
- Subsystems
- GUI Subsystem
- IDM Model Subsystem
- Synchronization Implementation
- User Synchronizer
- Workflow Management
- Data reference
- How to develop your own approval processes - case 1 - using primary change processor and general item approval process
- How to develop your own approval processes - case 2 - using primary change processor and custom workflow process
- How to develop your own approval processes - case 3: using general change processor
- Workflow Auditing
- Infrastructure Subsystem
- Provisioning Subsystem
- Repository Subsystem
- System Interactions
- Concepts
- Abstract Role
- Common Interface Concepts
- Consistency Model
- Lightweight Identifier
- Operation Result
- Relaxed Referential Integrity
- Task
- Principles
- Junkyard
- Configuration Reference
- Concepts
- Activation
- Channel
- Clockwork-Related Concepts
- Clockwork and Projector
- Conflict Resolution
- Focus and Projections
- Hooks
- Model Context
- Scripting Hooks
- Data Representation Formats
- Item Path
- Iteration
- Matching Rules
- Object Lifecycle
- PolyString
- Query
- Axiom Query Language
- Basic usage
- Axiom in expressions
- Axiom in Groovy
- Searchable elements
- Errors while using Axiom
- GUI search - EXAMPLES
- XML Query Language
- Relation
- Relativity
- System Configuration Object
- Cases and Approvals
- Approval
- Cases and Work Items Notifications
- Creation of multiple object-related approval processes via policy rules
- Escalation in Approval Processes
- Legacy Workflows
- Approvals examples (legacy)
- Legacy Workflows (midPoint 3.x)
- MidPoint 3.5
- New (3.5+) workflow configuration
- Pre-3.5
- Workflow notifications
- Workflow security (authorizations)
- Role Request and Shopping Cart
- Workflowless
- Object Marks
- Prism Code Generator
- Simulations
- Smart Correlation
- Custom Indexing
- Fuzzy Searching
- Multiple Identity Data Sources
- Rule Composition
- The
items
Correlator - Things to Be Discussed
- Expressions and Mappings
- Expressions
- Mappings
- Mapping Condition
- Mapping Range
- Mapping Relativity
- Inbound Mapping
- Outbound Mapping
- Mapping Evaluation Examples
- Troubleshooting
- Proposed Improvements
- Constants
- Expression and Mapping Trace
- Function Libraries
- Non-Tolerant Induced Focus Mappings
- Object Template
- Sequences
- Variables
- Practices
- Schema and Archetypes
- Archetypes
- Common Data Model
- Custom Schema Extension
- Data Model Essentials
- Focus and Projections
- Generic Objects
- Object References
- PolyString Normalization
- Schema Notes
- SchemaDoc
- Subtype
- Roles and Policies
- Access Certification
- Access Certification Tutorial
- Ad-Hoc Certification
- Authorization
- Determining Case Outcome
- Escalation in Certification Campaigns
- Iteration
- Notifications
- Reports
- Stages
- Assignment
- Assigning vs Linking
- Assignment Configuration
- Assignment Path Variables Example
- Assignment vs Inducement
- parentOrgRef and assignments
- Using Assignment Path in Expressions
- Automatic Role Assignment
- Meta-roles
- Policy Rules
- Policy-Driven RBAC
- RBAC
- Role Autoassignment
- Role Catalog
- Role Lifecycle
- Role Mining
- Roles and Policies Configuration
- Roles, Services and Orgs
- Segregation of Duties
- User-Friendly Policy Selection
- Task Management
- Activities
- Activity Error Handling
- Control Flow
- Distribution
- Execution and Execution Mode
- Migration of Tasks from 4.0/4.3 to 4.4
- Object Set Specification
- Reporting
- Activity State Overview Maintenance
- Bucket Size Analysis
- Dynamic Profiling
- Execution Reports
- Item Counting
- Logging
- Simulation Result
- Tracing
- Resource Object Set Specification
- Tailoring
- What’s New For Tasks in 4.4
- Work Definition (Types of Activities)
- Auto-Scaling
- Create Custom Task (Java)
- Description of Specific Activity Types
- Node-Sticky Tasks
- Orphaned Tasks
- Parallelized background tasks
- Recompute Task
- Redundant Objects Processing Elimination
- Scripting Tasks (Bulk Actions)
- Shadow Refresh Task
- Starting MidPoint With Task Scheduler Stopped
- Synchronization Tasks
- Task Chaining
- Task Error Handling
- Task Manager
- Task Template
- Tasks: What’s New In 4.3
- Thresholds
- Task Notifications
- Interfaces and Integration
- Organizational Structure
- Resources and Provisioning
- Asynchronous Resources
- Attribute Caching
- Auxiliary Object Classes
- Connector Setup
- Entitlements
- Manual Resource and ITSM Integration
- Multi-Connector Resource
- Multiaccounts
- Provisioning Dependencies
- Provisioning Propagation
- Provisioning Scripts
- Resource Configuration
- Capabilities
- Consistency
- Paged Search on Resources
- Protected Accounts
- Read-Only Resource
- Resource and Object Type Inheritance
- Schema Handling
- Simulated Disable
- String to ProtectedString Connector Configuration
- Synchronization
- Resource Maintenance State
- Resource Schema
- Shadow Objects
- Using ConnId Connectors
- Weird Resources
- Synchronization
- Introduction
- Consistency mechanism
- Correlation and Confirmation Expressions
- Examples
- Flavors
- Generic Synchronization
- Linked Objects
- Named object links
- Scenario 1: Hardware Tokens
- Scenario 2: Devices Owned By Users
- Scenario 3: Projects
- Scenario 4: Clubs
- Scenario 5: Deletion-Safe Organizations
- Policies
- Projection Policy
- Situations
- Synchronization Sorter
- Configuration Samples
- Configurable Transform Sample
- Distribution Samples
- Evolveum Demo Sample
- LDAP PosixAccount and PosixGroup Management
- Managing Consumer Devices (IoT) Connected to a Cloud IoT Platform
- Multi-tenant User Management for SaaS
- Next Generation Directory-based User Management for Cloud Infrastructure
- Story Tests
- Administration User Interface
- Admin GUI Configuration
- Application of GUI Configuration and Authorization Changes
- Area Categories
- Custom forms
- Dashboards
- Delta visualization
- Deployment Information
- Feature Customization
- Localization
- Look & Feel Customization HOWTO
- Look & Feel Customization HOWTO before 4.6
- Object Collections and Views
- Request access
- Resource wizard
- Role Catalog
- Role Request and Shopping Cart
- Role wizard
- Sections (virtual containers) in object details
- Self-Service
- Simulations
- Summary Panel Customization
- User Interface Form Fields
- User-Friendly Policy Selection
- Upgrade And Migration
- Connector Upgrade
- Database Schema Upgrade
- FAQ, issues during upgrade
- Migration from Sun IdM
- Tomcat to Standalone Deployment
- Upgrade Guide
- Upgradeability
- Security
- Auditing
- Authentication
- Authentication Configuration (Spring Security)
- Flexible Authentication
- Post-authentication configuration
- Authorization
- Access Certification
- Authorization Roles
- Bulk Actions Authorizations
- Configuration
- GUI Authorizations
- Model Authorizations
- Service Authorizations
- Spring Boot Actuators
- Troubleshooting
- Credential Management
- Identity recovery
- Initial Password Management Discussion
- Password Policy
- Password Reset
- Password Storage Configuration
- Password-Related Configuration
- Cryptography
- Keystore Configuration
- Migrating encryption keys
- OpenSSL Tips & Tricks
- TLS Connections (Client Side)
- CSRF Protection
- Execution of Trusted Bulk Actions by Unprivileged Users
- Expression Profiles
- Power of Attorney
- Privilege Elevation (runAsRef, runPrivileged)
- Security Advisories
- MidPoint user interface clickjacking
- Abuse of expressions in midPoint reports
- XXE Vulnerabilities
- AD and LDAP connectors do not check certificate validity
- Workitem identifier weakness
- Plain text password in temporary files
- Plain text password in task objects in repository
- XSS Vulnerability In displayName
- SOAP Web Service Vulnerable To Brute Force Attack
- Authorizations not applied properly to preview changes
- Stored XSS vulnerability via 'name' property
- User changes and user session updates
- HTTP error codes used for SecQ REST authentication reveal user existence
- Ghostcat Vulnerability of Apache Tomcat
- Security Advisory: Disabled Users able to log-in when LDAP authentication is enabled
- Security Advisory: Unauthorized user is able to reset password if focusIdentification is enabled
- Security Advisory: Self Registration feature allows to change password of other users
- Less privileged user able to execute custom Groovy scripts via Bulk Tasks
- XSS Vulnerability In fullName and displayName
- Security Advisory: CSRF protection was not working if user logged using SAML2 or OIDC
- Security Guide
- Security Policy
- Diagnostics and Troubleshooting
- Aggressive Log Report
- Common Problems
- Creating a Bug Report
- Diagnostics Abbreviations
- Initial Logging Setup
- Logging
- Operation Progress Reporting and Abort
- Thread Dump Collection And Inspection
- Troubleshooting Guides
- Repository
- Configuration
- SQL Audit
- Repository Database Support
- SQL Schema Scripts
- Native PostgreSQL Repository
- Usage
- PostgreSQL Configuration
- DB maintenance
- Usage before 4.8
- Migration to Native PostgreSQL Repository
- Design and Implementation
- Generic Repository
- Repository Configuration
- SQL Audit
- Implementation
- Database schema versioning
- H2
- MariaDB
- MS SQL
- MySQL
- Oracle
- PostgreSQL
- Full-Text Search
- Repository Objects Inspection
- Database Schema Upgrade
- Deployment and Maintenance
- Clustering / high availability setup
- Deployment Concepts
- High Availability and Load Balancing
- Initial Objects
- Maintaining midPoint Configuration as Files
- MidPoint Home Directory
- Multi-tenancy
- Ninja
- Overlay Project
- Ports 80 and 443
- Post-Initial Import
- Removing obsolete information
- Service Account Management
- Spring Boot Actuator Endpoints
- Stand-Alone Deployment
- Syslog Logging
- Misc
- Bulk Actions
- Actions
- Constant
- Filter Content
- How to provide password values to bulk actions (and other task types) securely
- Pipeline
- Raw mode
- runscript command line tool
- Scripting Tasks
- Select
- Sequence
- Variables in bulk actions
- Deputy
- Lookup Tables
- Notifications
- Access Certification
- Message templates
- Configuration
- Configuration 4.4 and before
- Custom Notification Transport
- General notification - role assignment example
- Sending Custom Notifications
- Task Notifications
- Velocity Templates
- Personas
- Prism Experimental Features
- Reports
- Access Certification
- Create Report Guide
- examples
- Audit report with changed attributes
- Comparing attributes of shadow and attributes of user in midPoint
- Example: Audit, administrativeStatus
- Example: Number of members
- Example: policySituation
- Example: Shadows
- Long unchanged accounts
- Reference search based report
- Users without account
- Post-Report Script
- Report Configuration
- Report Configuration before midPoint version 4.4
- Report Configuration Tips
- Report Script Library
- Rewrite Jasper to Object Collection Report Guide
- Self Registration Configuration
- Services
- Tips & Tricks
- Value Metadata
- Legacy
- demo
- Eclipse plugin HOWTO
- IDM Model Web Service Interface
- Influencing approval process and work items names HOWTO
- Jaspersoft Studio - midPoint integration HOWTO
- LDAP Groups HOWTO (Obsolete)
- MidPoint and SSO (Legacy)
- Midpoint and SSO using Gluu HOWTO
- MidPoint as CAS Client (Apache CAS Agent Method)
- MidPoint as CAS Client (Java Jasig CAS Client libraries)
- Model Web Service SOAP Client
- Monitoring c3p0 state HOWTO
- Org closure migration and diagnostics HOWTO
- Repo Ninja
- Reports via REST
- XPath2 Tutorial
- Guides
- Writing Evolveum Documentation
- Full-Text Search
- Access Certification Tutorial
- Active Directory Group Synchronization HOWTO
- Approvals via REST HOWTO
- Bulk password generation HOWTO
- Cleaning Up The Mess HOWTO
- Creating a Bug Report
- Dashboards HOWTO
- GUI User Profile
- GUI: Assignment Repository Search
- GUI: Search with Axiom - EXAMPLES
- Listing users and their roles HOWTO
- Maintaining midPoint Configuration as Files
- MidPoint Administration Interface User Guide
- midPoint on Ubuntu, Tomcat, PostgreSQL HOWTO
- Security Guide
- Show Only Active Users HOWTO
- Simulated Disable
- Unique Account Username HOWTO
- Unique midPoint User Name
- Unique property value HOWTO
- Upgrade Guide
- Weird Resources
- Troubleshooting Guides
- Developer Zone
- Axiom
- Bugfixing and Support
- Components Development Documentation
- Continuous Integration
- Design Notes
- (Idea of) Communication with Remote Workflow Management System
- Access Certification - requirements draft
- AD Connector Design Notes
- AI Thoughts
- apply-schemas-and-security-4.8
- Approvals terminology
- Archetypes Design Notes
- Assignment Evaluator Questions and Ideas
- Bulk actions (unordered notes)
- Changes in Resource-Related Definitions in 4.5
- Concepts in approvals, certification, and remediation
- Concurrency and Thread Safety
- Configuring individual task handlers
- Dashboards, Widgets and Reports Design Notes
- Deltas in Projector and Clockwork
- Design Meeting
- DOT renderer troubleshooting
- Efficient Deployment Ideas
- Entitlement Design Notes
- Error handling and task suspension in LiveSync
- Grouper Integration Notes
- GUI Profile & Cache Invalidation Updates for 4.6
- How to display approval case (planned or real) execution
- How to use workflows in a self-service scenario
- Identifier Theory
- Item Path Canonicalization Examples
- Iterative search in midPoint 3.9 and later
- Lifecycle
- Lightweight asynchronous tasks
- Mapping Notes
- MidPoint 5 Vision
- MidPoint Deployment Language Draft
- Midpoint Query: Next Evolution
- Midpoint Studio switch to Gradle
- Multi-node, partitioned and stateful tasks
- New approvals - sample data structures
- Object Names and Labels
- Obtaining results of asynchronous bulk actions
- On Asynchronous Processing
- On Multiple Node Reconciliation
- Parallel and Asynchronous Provisioning
- Performance Improvements in 4.8
- Policy Constraints
- Policy Triggers Evaluation
- Sample scenario
- Some policy scenarios
- Using policy-driven information in workflows, certifications, notifications, reports, etc.
- PolyString Design Notes
- Profiling Concepts
- Projector and clockwork internals
- Provisioning Scripts vs Postponed Operations
- Query API: Proposed Features for 4.6
- Relation Repository
- Repository query interpreter (Query API → HQL)
- Resource Schema Improvements in 4.6
- Missing (Default?) Kind and Intent Values
- Refining Object Classes
- Shadow Classification Changes in 4.6
- Role Mining Design Notes
- Schema cleanup in 4.8
- Schema migration and raw values
- SchemaDoc NG Design Notes
- SCIM Troubles
- Scripting (bulk actions) variables
- Security Improvements in 4.8
- Shadow Metadata and Auditing
- Shibboleth integration
- Simplification of processing in clockwork and projector
- simulations
- Limitations
- Shadows in "Simulation Mode"
- Simulations - Delta visualization
- Simulations - Design Decisions and Questions
- Simulations - Repository and Model
- Simulations - The Requirements
- Simulations in Model
- Tagging as a New Feature
- Smart Correlation in midPoint 4.6 and Beyond
- Correlation: Simple vs "Multi-Identities"
- Smart Correlation Configuration
- Smart Correlation Repository Notes
- Streams and ItemPath performance
- Task archetypes (GUI) open questions
- Task authorizations
- Tuning midPoint on Oracle
- Understanding ApprovalSchemaExecutionInformationType
- Upgrade
- Upgrade process
- User Accesses
- User Notifications
- user-interface
- UX Design notes
- XML/JSON/YAML vs. XNode vs. internal data
- Archive
- Development Applications
- GUI Development
- GUI Development Guide
- GUI Look and Feel Style Guide
- List of Deprecated GUI Components
- List of Reusable GUI Components
- System Configuration GUI
- UI/UX problems in current midpoint administration interface
- Guidelines
- Guides
- Backporting Code to Support Branch
- Building .Net Connectors and Connector Framework
- Building OpenICF Connectors
- Development Environment Setup
- Development with LookupTable
- GUI Development Guide
- GUI Look and Feel Style Guide
- Log Levels
- Releasing the Eclipse plugin
- XML Conventions
- JavaDoc
- Maven Repository
- MidPoint Client Library (Java)
- Prism
- Requirements and Analysis
- Approvals design notes
- Role wizard design notes
- Role wizard user stories
- User Stories - Approvals
- User Stories - Certifications
- User stories - other
- Source Code
- Testing
- Big Testing NG Ideas
- Community Pre-release Testing
- Dummy Resource
- Embedded OpenDJ
- GUI Testing
- Basic CSV Account Tests
- Basic Organization Tests
- Basic Role Tests
- End User Tests
- Login Tests
- Organization Structure Tests
- Resource-User-Account Tests
- Simple User Tests
- Super User Tests
- Integration Tests
- Perfomance Tests Ideas
- Test Scenarios
- Test-Driven Bugfixing
- Testing midPoint pre-releases
- Testing of remote authentication modules
- Tracing in tests
- Unit Tests
- Translations
- XML Namespace List
- Exercises
- Advanced Organizational Structure Synchronization
- Basic Entitlement Management
- Basic Organizational Structure
- Exercise tips
- Governed Identities
- HR Feed
- LDAP Provisioning
- Nicer Small Company
- Small LDAP-based Company
- Synchronize organizational structure to LDAP
- Live Demo
- Operations manual
- MidPrivacy
- MidScale
- MidPoint Studio
- Methodology
- First Steps With MidPoint
- 1. Kick-Off
- 2. Assessment
- 3. Automation
- Solution Notes
- Audience
- Current Situation
- Use Cases and Concepts
- IGA Design Notes
- IGA and User Access
- Objects and midPoint
- Access Modeling
- Displaying of User Access
- Parametric Access
- IGA Use Cases
- Role engineering use-cases
- Operations use-cases
- Self-service use-cases
- Access certification use-cases
- Visibility and reports use-cases
- IGA Reporting
- IGA Processes
- Deployment Methodology
- Notes
- Missing Features
- Projects
- Identity Matching
- Hypothetical Notification Design
- Identity Matching Design
- implementation
- Correlation-Time Mappings
- Identity Matching (Correlation) Implementation
- Identity Matching: Multi-Accounts Scenario
- Sample ID Match Service
- Notification Redesign in 4.5
- Synchronization Flow
- MidConnect
- MidPrivacy
- Phases
- MidPrivacy: Data Provenance Prototype
- axiom
- Axiom Concepts
- Axiom Design Notes
- Axiom Representation Formats
- Axiom Specification v0.1
- Axiom Background
- Axiom Overview
- Axiom Syntax
- Completeness
- Design Principles
- Item Path
- Metadata
- Model Versioning
- Namespaces
- Terminology
- Axiom TODO
- Core Concepts
- Cross-Model Use Cases
- drafts
- Existing Schema language analysis
- Extensibility
- MidPoint Metadata Examples
- Prism and Axiom
- xsd-keywords-use
- Data Provenance Prototype Challenges
- Future Work
- Identity Metadata In A Nutshell
- Metadata Multiplicity Problem
- Metadata Usecases and Structure Design
- MidPrivacy: Data Provenance Prototype Abstract
- Notes from Internet2 ACAMP (un)conference session
- Outcomes Of MidPrivacy: Provenance
- processing
- Metadata processing model
- Provenance, Origin and Basis
- Provenance/Axiom Implementation Notes
- Solution Architecture of Data Provenance Features
- Use Cases for Data Provenance
- Proposed Phases
- Use Cases
- Bibliography
- Ideas
- Terminology
- MidScale
- Architecture
- Design Notes
- GUI Design Meeting
- Infrastructure Design Meeting
- MidScale Design Meeting Overview
- MidScale: Prism Design
- Performance and state monitoring
- Query Language
- Query Language Example Conversions
- Repository
- Comparing JSONB and EAV model for extensions
- Organization structure
- PostgreSQL Experiments
- Repository Design
- Repository Implementation
- SQL Repository - problematic queries
- Starting with new repository
- Schrödinger Design Notes
- Task state, progress, and error reporting
- Tasks Design Meetings
- Testing Design
- Thread Safety: Requirements and Design
- Infrastructure
- Performance/Scalability test results
- Survey
- Milestones
- Project Management
- Tools
- Developing midPoint with IntelliJ IDEA
- MidPoint Studio
- Build and Release
- Development
- Limitations
- Migration from Eclipse Plugin
- Working with midPoint Studio
- Ninja
- Schrödinger Testing Framework
- Python CLI
- Versioning
- History
- Identity Connectors
- Connectors
- Built-In Connectors
- Support
- LDAP Connector
- Active Directory Connector (LDAP)
- DatabaseTable Connector
- CSV Connector
- GitLab Connector
- Grouper Connector
- Grouper Connector (JDBC)
- Jira Connector
- Kafka Connector
- Microsoft Azure (Graph API) Connector
- PeopleSoft HCM connector
- PowerShell Connector
- SAP Connector
- SCIMv1 Generic Connector
- ScriptedSQL Connector
- Siebel Connector
- SmartRecruiters Connector
- SSH Connector
- SWITCH edu-ID Affiliation Connector
- UNIX Connector
- Amazon Cognito User Pool Connector
- Auth0 Connector
- Box Connector
- Box Connector (SDK)
- Coupa Connector
- Crowd Connector
- CVS to Cloud Storage Connector
- Datadog Connector
- FreeIPA Connector
- GitHub Connector
- GLUU Connector
- GotoMeeting Connector
- Grafana Connector
- Guacamole Connector
- Kerberos Connector
- Keycloak Connector
- Kintone Connector
- Mattermost Connector
- Neo4j Graph Database
- Odoo Connector
- Okta Connector
- OpenAM Connector
- Pulumi Connector
- SafeNet Trusted Access Connector
- SAP UME Connector
- ServiceNow Connector
- SmartHR Connector
- Sympa Connector
- Webex Connector
- WordPress Connector
- Zoom Connector
- Google Apps Connector
- CMD Connector
- Drupal 7 Connector
- LifeRay Connector
- Oracle Connector
- SAS Connector
- Waveset Connector
- eDirectory Connector
- Legacy Office 365 Connector
- Legacy Scripted REST Connector
- Legacy ScriptedSQL Connector
- Solaris Connector
- CSVFile Connector (legacy)
- Exchange Connector (.NET)
- Legacy Active Directory Connector (.NET)
- Legacy LDAP Connector
- Lotus Notes/Domino Connector
- Planned Connectors
- ConnId
- ConnId 1.x
- Connector Server
- ConnId 1.x Connector Development Guide
- ConnId 1.x Framework
- ConnId Result Handlers
- ICF Issues
- OpenICF
- REST Connector Superclass
- ConnId 2.x - PLANNED
- Connector Upgrade
- ConnId Connector Development Guide
- Troubleshooting
- Resources
- Active Directory and Windows
- Active Directory Group Synchronization HOWTO
- Active Directory With .NET Connector (OBSOLETE)
- Active Directory with LDAP connector
- Documentation Links
- Legacy .NET Connector
- Multi-Domain
- Password Change
- Powershell
- Powershell (WinRM)
- SSH Server
- Tips & Tricks
- Any Command (CMD)
- Any Database (ScriptedSQL)
- DatabaseTable
- LDAP Servers
- 389 Directory Server
- Directory Server Enterprise Edition
- LDAP Servers Summary
- LDAP Survival Guide
- LDAP Tips and Tricks
- OpenDJ
- OpenLDAP
- Microsoft Azure (Graph API)
- UNIX Connector Resource Samples
- Zimbra
- Legacy
- Support
- Bug-Tracking System
- Bundled Support
- Connected Systems
- Long-Term Support
- Subscriptions and Sponsoring
- Support Guidelines
- Trainings
- MidPoint Advanced Customization Training Page
- MidPoint Deployment Fundamentals Training Page
- MidPoint Training Previews
- Evolveum
- Community
- Academia
- Community Guidelines
- Community Sites
- Development Participation
- Dual Licensing
- Feature Request
- Feedback
- Mailing Lists
- Related Projects
- Requirements For MidPoint Engineers
- Surveys
- Misc
- Library
- Case Studies
- Talks
- Glossary
- Frequently Asked Questions
- Can I use newer version of XYZ with midPoint?
- I Have Found a Bug
- I Need New Feature
- Is Tomcat deployment still supported?
- What are ConnId result handlers?
- Why is my bug not fixed yet? I have reported it weeks ago!
- About