Prisoner of Legacy Systems

At some point, old software installed, just has to go away. The million dollar question is when. After recently experience of having a legacy system for about 8 years too long that prompted me to blog on this topic. I’ve seen the impact first hand with regard to project timelines, business climate changes, and constant tickets to... Continue Reading →

Detailed Identity Data Flow

Microsoft Visio diagram for an entire Enterprise Detailed Identity Data Flow of both user and roles using SOA (Service-Oriented Architecture), HCM (Human Capital Management), and OIM (Oracle Identity Manager) to facilitate the business rules and how the data flows into all ecosystems.

Design Pattern for Perimeter Protected Access

Identity Provisioning is a service within the Identity Governance stack that provides various provisioning services to the business. Authoritative identity data is based person data from the HCM (Human Capital Management) and is reconciled and aggregated with other user data associated based on business rules. The goal is deliver end-to-end security in J2EE applications, Web services, identity management, and service provisioning.

The Laws of Architecture Ignorance

Over the years I encountered many good mistakes and failures that has helped me mature either through my own modest ignorance or at someone else’s expense. When we hear words such as “mistake” or “failure”, we have a tendency of immediately entrenching a negative perception in our minds. We all know the common clichés of failures since you cannot read for more than 2-3 minutes on any blog site without seeing an inspirational quote that either tries to make us feel good about our own failures or not be afraid to embrace them

Design Pattern for Identity Provisioning

A Design Pattern provides a scheme for refining the subsystems or components of a software system, or the relationships between them. It describes commonly recurring structure of communicating components that solves a general design problem within a particular context. Architectural patterns are similar to software design patterns but have a broader scope. Identity Provisioning is a service within... Continue Reading →

TALEND, EVEN A CAVEMAN CAN USE IT- “FUTURE-PROOF ARCHITECTURE”

Those who are constantly thinking and searching for better tools and ways of getting from A to Z, eventually find themselves through the technology maze not feeling like that a blind squirrel searching for a tasty traditional nut to eat. You start asking yourself “What can add longevity and flexibility to a business capability?” or maybe even “How can we future-proof nuts?”

Need more cowbell! – “Got IdM?”

The new tone of “Identity Governance“(with a small g-Credit to Geoff), is stepping in as the new sheriff of the language marketing game.  Kind of like what “Cloud” did with aggregating storage area network clusters with unused parking data spaces. No offense.   Identity Management (IdM) the ‘It Doesn’t Mew’ anymore acronym. That once known 25+... Continue Reading →

Design Pattern for Federated Single Sign-On Access

A Design Pattern provides a scheme for refining the subsystems or components of a software system, or the relationships between them A Design Pattern provides a scheme for refining the subsystems or components of a software system, or the relationships between them. It describes commonly recurring structure of communicating components that solves a general design problem within... Continue Reading →

Blog at WordPress.com.

Up ↑

%d bloggers like this: