Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

IAM Principal Consultant & Head of Center of Excellence One Identity - iC Consult

iC Consult’s partnership with One Identity has gone back a long time, thanks to the comprehensive One Identity portfolio of unified IAM solutions. Join Oliver Paulzen to explore the advantages of the iC Consult-One Identity partnership and the benefits of the integrated solutions that make up the One Identity Fabric.

How to Setup SAML SSO + SCIM for Jira with KeyCloak as IdP

This video tutorial guides you through setting up the miniOrange SAML+SCIM Bundle for Jira with Keycloak as your Identity Provider (IdP). Learn how to integrate Jira with Keycloak to enable secure Single Sign-On (SSO) and automate user provisioning between the two platforms. With this integration, you can: Allow users to access Jira using their Keycloak credentials Automatically provision, update, and deactivate users from Keycloak in Jira.

Android Zero Touch Enrollment (ZTE) - An Overview

Imagine a company ordering new Android phones for their sales team. Without the right management solution in place, the IT team would spend hours (sometimes days) unboxing each phone, setting it up, downloading company apps, and repeating the same steps over and over again. The risk? delayed device rollouts and wasted time and energy.
Featured Post

Provision 29 Is Coming: Why Identity Security Must Now Be a Boardroom Priority

Starting January 2026, Provision 29 of the UK Corporate Governance Code will require boards to report annually on the continuous effectiveness of their internal controls, including cybersecurity, or risk a substantial fine. In terms of reporting, Provision 29 marks a shift from "Do we have controls?" to "Can we prove they work?"

Securing AI agents: privileged machine identities at unprecedented scale

Earlier in 2025, an AI agent named Claudius made headlines when it insisted it was human, promising to deliver products in “a blue blazer and red tie.” Quirky? Sure. But beneath the strange admission sat a more important truth: today’s AI agents aren’t just chatbots with puppet-like ambitions, whose untruths would be betrayed by a growing nose. They’ve evolved into actors with real credentials, access, and autonomy.

AI-Generated Attacks: What are They and How to Avoid Them?

AI-generated attacks, such as social engineering, phishing, deepfakes, malicious GPTs, data poisoning, and more, are disrupting the current security landscape speedily. But there are ways to avoid them and strengthen our defences with miniOrange IAM solutions.

Drupal Session Management - Login Restriction

In this video, we show you how the Login Restriction feature in our Session Management module works, helping you control who can access your site. You’ll learn how to secure your website by setting rules around where and when users can log in, using IP-based restrictions to allow logins only from specific IP addresses or ranges, country-based restrictions to limit access to users from selected countries, and time-based restrictions to control logins during specific hours or days. Watch the video to see step-by-step instructions and keep your site safe and secure.

Secure WordPress Login with One Click | miniOrange SAML Single Sign On (SSO) Plugin

Managing multiple logins across your WordPress environment can be frustrating for both users and teams. The miniOrange SAML Single Sign On (SSO) Plugin eliminates password fatigue by allowing users to log in once and access everything they need. Connect your dashboard, store, forum, LMS, and more through one secure, seamless login experience, powered by SAML 2.0 and trusted Identity Providers like Google Workspace (Google Apps, Okta, Salesforce, Azure AD (Microsoft Entra ID), Keycloak, ADFS, Office 365, OneLogin, Auth0, PingOne, WordPress, Oracle, JumpCloud, CyberArk, and more.