Identity Automation Blog

Managing Infrastructure with RapidIdentity Part 2: Managing Linux Hosts

Information technology teams tend to have a lot on their plate in terms of installing, maintaining, and protecting various systems throughout the enterprise. The larger the environment, the darker the cloud that tends to loom overhead when it comes to managing even trivial tasks, such as installing management agents or antivirus and keeping them up-to-date. Typically, this is due to the fact that there simply aren’t enough hands on the team, nor hours in the day, to touch dozens or hundreds of machines in disparate datacenters.

Read More

Managing Infrastructure with RapidIdentity Part 1: The Basics


At Identity Automation, we focus on providing solutions to meet a wide variety of our customers’ needs. As our name implies, “Automation” is an important aspect of our belief that consistent, repeatable activities are key to any successful IT endeavor. Our RapidIdentity product set allows our customers to follow in that mindset and to build, test, and deploy highly
tailored and effective management tools quickly, efficiently, and creatively. This all helps to minimize an organization’s staff efforts, while maximizing productivity.

Read More

Making the Case to Your CIO to Upgrade Your IAM System, Part 1

According to the new 2016 Verizon Data Breach Investigations Report (DBIR), legitimate user credentials were used in most data breaches, with some 63 percent of them using weak, default, or stolen passwords. This may come as some surprise to businesses that are not yet victims of such breaches as they continue to utilize homegrown, piecemeal, or legacy identity access management (IAM) solutions. While your CIO is focused on perimeter defense, your challenge is to shift this focus to the need for a more robust, modern, and integrated IAM solution, which is easier said than done.

Read More

Building Web Services with RapidConnect Part 3: Building an Authorization Engine Example

In Part I of our “Building Web Services with RapidConnect” series, I described how to create a simple Web Service using RapidConnect.  To summarize, any RapidConnect action set results in having a new Web Service API method. The primary benefit is that users are limited only by imagination and available data to build powerful Web Services to use.

I then discussed in
Read More

Building Web Services with RapidConnect Part 2: Virtual Directory Middleware Example

In Part I of our “Building Web Services with RapidConnect” series, I described how to create a simple Web Service using RapidConnect. To summarize, any RapidConnect action set results in having a new Web Service API method. The primary benefit is that as a user, you are limited only by imagination and available data in building powerful Web Services for your own use.

Read More

Introducing the RapidIdentity Technical Blog Series


Our Technical Support and Product teams are often asked for advice and best practices regarding various technical subjects pertaining to our RapidIdentity software. Over the years, we’ve noticed that certain topics have a habit of popping up more than others. We knew that putting together step-by-step resources on these common topics would not only be educational for our customers, but would also enable them to explore these topics at their own pace.

Read More

Building Web Services with RapidConnect Part 1: The Basics

One of the great features of RapidConnect is the flexibility to execute action sets.  There are three methods for running your action sets:

Read More

4 Signs You Need to Modernize Your Identity Management Software

According to Statista, the market for identity and access management is expected to grow to 7.1 billion dollars by the year 2018. This is up from 4.5 billion dollars in 2012; and much of this growth can be attributed to the fact that so many organizations are looking to upgrade their identity management software to better meet the security and workflow needs their company faces.

Unfortunately, there is no odometer on your current identity management solution that tells you it is time for an upgrade. Instead, knowing when you need to look at making a change can be determined by these four key factors.

Read More

Identity Automation Allows Organizations to Manage Up to 8 Times More User Identities with Existing Hardware

As we announced in our recent press release, RapidIdentity 4.0 is now available, so I thought I’d discuss what this enhanced functionality and scalability means for our new and existing customers.

Read More

Authentication Methods: How to Beef up Your Cybersecurity Without a Password

In our most recent blog post on RapidIdentity 3.5, we announced the new authentication methods available to our customers. Each of these authentication methods fall under the three standard types of authentication required of users: something the user knows, something they have, or something that they are. In announcing these new authentication methods, we’re supporting our larger multi-factor authentication vision and the ability for users to utilize the authentication methods that work best for them rather than simply having passwords forced on them.

Read More

Subscribe Here!