OpenLDAP & LMDB Sizing Guide
Jan 17, 2022 Introduction Symas OpenLDAP configured with LMDB has been extensively tested and its performance characteristics are well...
Jan 17, 2022 Introduction Symas OpenLDAP configured with LMDB has been extensively tested and its performance characteristics are well...
Please note that the certificates must be in a pem format (.pem or .crt). You will need three certificates: Root CA certificate, server...
Slides from yesterday’s lightning talk describing how Apache Fortress fixes the so-called ‘Role Explosion’ problem in RBAC by applying...
Many LDAP Directories have several servers handling requests from many clients. The load on each server varies. Redirecting traffic when...
Just back from Gartner’s IAM Summit in Vegas where I learned about industry trends surrounding Identity and Access Management, its...
Apache Fortress and OpenLDAP configuration for HA
In July I saw this article on The Register about the lack of account security in the enterprise. From the article: “Few companies bother...
AVAILABLE WITH SYMAS OPENLDAP GOLD 2.4.46.1 Passwords, everyone loves to hate them and still, in the era of digital certificates,...
Readers know that Attribute-based Access Control (ABAC) is a bit of an obsession with me. It stems from the want to have something like...
[Link to the Apache Fortress RBAC-ABAC-SAMPLE project on Github] We’ve all heard the complaint, RBAC doesn’t work. It leads to Role...
Watching application teams struggle implementing access control systems brings me to a talk I gave at ApacheCon a couple of years ago....
Very soon we’ll have a release of py-fortress that works with just the file system. This is to lower complexity of testing and developing...
The Command Line Interpreter (CLI) may be used to drive the RBAC System APIs, to test, verify and understand a particular RBAC policy....
The Command Line Interpreter (CLI) drives the admin and review APIs, allowing ad-hoc RBAC setup and interrogation. More info in the...
py-fortress is a Python API implementing Role-Based Access Control level 0 – Core. It’s still pretty new so there’s going to be some...
EQUIFAX BREACH Recently there’s been a buzz over the Equifax breach — rightly so. It’s a transformative event and its effects will...
How to Govern and Maintain Compliance Using Open Source Identity Management Components - Katarina Valalikova, Evolveum & Shawn McKinney,...
It seems every year there’s a new protocol for handling security. I was first sucked down into this black hole in the ’90’s. Few...
The goals of this tutorial are to Gain understanding of the Role Based Access Control (RBAC) standard Learn the repeatable steps of the...