Questions tagged [identity-management]

broad term used for authentication and authorization systems

This term is broadly used to cover issues such as how users are given an identity, the protection of that identity, and the technologies supporting that protection (e.g., network protocols, digital certificates, passwords, etc.) detailed reading

286 questions
2
votes
0 answers

Account not provisioned to user using RBAC in oim12c

I have created a role and access policy (has app instance) assigned to the role. when i create a user , role is assigned but no resource added to user account. I ran catalogue as well evaluate user policy schedulers.Resource not updated in user…
Sairu
  • 31
  • 2
2
votes
1 answer

Db queries of OIM

DB query to check Account status of the user DB query to check Entitlement status of the user DB query to check Role and Access Policy mapping. Please let me know if anyone have these queries?
2
votes
0 answers

Most appropriate approach to managing user Access control List (ACL) in a system with large number of users

I am designing a user management system where there is a very large number of users (millions) and with a small number of user groups (100s) and a small number of applications (100s). Users can be added/removed from groups. Users are given roles per…
picolo
  • 243
  • 1
  • 10
2
votes
2 answers

How to authenticate user via OIM API?

I need to do oim user authentication from third party application. I am searching for OIM API for the same.
2
votes
1 answer

Wso2 Identity server Soap Remote user store management admin service throws access denied error

I have setup wso2 identity server with default h2 database configuration. when i tired to access its RemoteUserStoreManagerService.getTenantIdofUser() soap admin service with super tentant admin credentials 'admin/admin', its throws 'access denied'…
2
votes
1 answer

Lotus Notes, ID files, and how things are changing in new versions (8 and up)

For those who are not aware, Lotus Notes is a cool system, which has very powerful database replication abilities, and very strong certificate management and signing. However that strong certificate usage is itself one of Notes's downfalls. When…
geoffc
  • 4,030
  • 7
  • 44
  • 51
2
votes
2 answers

An IdP/STS for SaaS providers, where the SaaS customer does his own user management?

(This question is not about programming, but about how to avoid doing any programming. Also, lots of terminology in here-- I'm assuming someone with an answer will already know what they mean.) Background: I'm working on single sign-on in an…
2
votes
2 answers

Identity and Access Management for Heroku Application

My identity and access management tool of choice is OpenAM utilising their container based policy agents, this approach is not possible however using the Heroku Celadon Cedar stack -- at least it doesn't look possible to me (www.heroku.com) What is…
user1843591
  • 1,074
  • 3
  • 17
  • 37
2
votes
1 answer

Can I use the facebook credentials to for users to access my site?

I'm starting to work on a site that will be strongly connected to a corresponding Facebook app. I want the contents to be free for all to view, but only registered users will be able to edit it (quite similar to serverfault, actually). Since I think…
Adam Matan
  • 128,757
  • 147
  • 397
  • 562
2
votes
2 answers

Is there a self-hosted single sign-on solution with completely RESTful API?

Is there a single sign-on solution with completely RESTful API installable on my server? I have looked at OpenAM, which have some of the API available through HTTP/JSON, but not all (and seems too heavy, but if it had all the API, I'd not care). Do…
user1046334
1
vote
0 answers

Assign a predefined GCP IAM role to a principal except one permission

I want to grant the container.developer role to one IAM principal in GCP. However I want all the permissions except 1 (container.secrets.get). Is there an elegant way of going about this other than creating a custom role with all of those…
pkaramol
  • 16,451
  • 43
  • 149
  • 324
1
vote
1 answer

How to provide custom expiration for each access token in keycloak?

I am developing an application with Keycloak and I would like to generate access tokens with custom lifespans. Is it possible to pass a parameter to the token generation request that specifies the desired lifespan? For example, I would like to be…
1
vote
1 answer

Fully Automate Terraform AWS Organizations

The Background I am an admin IAM user of an AWS account which has an organization. What I want to do, is use these credentials to setup the bare minimum infrastructure necessary to handover everything to terraform, so that the maximum amount of work…
1
vote
1 answer

How can I read a SQS message using sqs-consumer inside an EC2 instance?

I have a node.js. daemon running in an EC2 instance that uses sqs-consumer library to read messages from a SQS. The problem I am having is that messages are written to the SQS but they are not consumed by my daemon. I am getting no error messages.…
1
vote
0 answers

Automating AWS Account Creation with Terraform

I am working on creating an AWS account using Terraform. I used Terraform resource (aws_organizations_account) to create an AWS account within the organization. This code creates the account within the organization i specify with no issues however…
1
2
3
18 19