[midPoint] MidPoint 4.8 ‘Curie’ Released!
Katka Bolemant
katkav at evolveum.com
Wed Nov 1 18:01:23 CET 2023
Dear midPoint community,
The third LTS version of midPoint, midPoint 4.8 code-named ‘Curie’, has been released. What does it bring?
One of the focuses in midPoint 4.8 is to provide [ https://docs.evolveum.com/midpoint/reference/master/deployment/ninja/upgrade-with-ninja/ | streamline upgrades ] . Improvements were made for reporting, object validation, and data migration. With our improved Ninja, users can better see what’s going on, where and what the problems are, and which data must be migrated. The Ninja tool continuously leads users throughout the upgrade.
One of the biggest and maybe the most interesting features midPoint 4.8 brings is [ https://docs.evolveum.com/midpoint/reference/master/roles-policies/mining/ | role mining ] . In cooperation with [ https://kinit.sk/sk/projekt/evolveum-use-of-ai-methods-in-identity-and-access-management/ | KInIT ] , we looked for a way to use AI/ML algorithms to help with mining business roles based on existing assignments to application roles. At the end of role mining sessions, new business roles are suggested. Such candidate roles can then be fine-tuned by business users. We believe that, among other benefits of role mining, this will simplify the bottom-up approach for creating business roles.
MidPoint 4.8 also brings plenty of improvements regarding security. For example, our [ https://docs.evolveum.com/midpoint/reference/master/security/authorization/configuration/selectors/type-and-parent/ | authorization model was extended ] to support more use cases than before, and authorizations [ https://docs.evolveum.com/midpoint/devel/design/apply-schemas-and-security-4.8/summary/ | performance ] was improved. A faster and more flexible [ https://docs.evolveum.com/midpoint/reference/master/security/privilege-elevation/ | elevation feature ] is also now available. In addition to those improvements, an [ https://jenkins.evolveum.com/view/midPoint-master/job/midpoint-master-security/ | OWASP dependency-check ] was added to our Jenkins to quickly detect any publicly disclosed vulnerabilities within used dependencies.
Another significant area we were focusing on during the development of midPoint 4.8 was the so-called [ https://docs.evolveum.com/midpoint/methodology/first-steps/ | First Step Methodology ] . For this area we mainly focused on improving user experience in midPoint. Different improvements were made, mostly related to the [ https://docs.evolveum.com/midpoint/reference/master/admin-gui/resource-wizard/ | resource wizard ] to make the process of connecting new systems as simple as possible.
Last but not least, driven by a subscriber, a new feature for [ https://docs.evolveum.com/midpoint/reference/master/security/credentials/identity-recovery/ | identity recovery ] was added.
Those are just some of the improvements added in midPoint 4.8. For the full list of changes, please see the [ https://docs.evolveum.com/midpoint/release/4.8/ | release notes ] . If you are interested in learning more about what’s new in midPoint 4.8, join us at the [ https://evolveum.com/training-and-certification/whats-new-in-midpoint-4-8-webinar/ | webinar ] taking place on November 2nd at 2PM CET / 9AM EDT / 10PM JST. Should you be curious about midPoint 4.8 in action, you can try our [ https://demo.evolveum.com/ | demo ] .
(Reposted from [ https://evolveum.com/midpoint-4-8-curie-released/ | Evolveum blog ] )
--
Katarina Bolemant
Development Team Leader
evolveum.com
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.evolveum.com/pipermail/midpoint/attachments/20231101/66ac3f4e/attachment.htm>
More information about the midPoint
mailing list