{"id":26298,"date":"2023-04-20T10:02:33","date_gmt":"2023-04-20T08:02:33","guid":{"rendered":"https:\/\/kinit.sk\/project\/evolveum-use-of-ai-methods-in-identity-and-access-management\/"},"modified":"2023-07-26T15:47:43","modified_gmt":"2023-07-26T13:47:43","slug":"evolveum-use-of-ai-methods-in-identity-and-access-management","status":"publish","type":"project","link":"https:\/\/kinit.sk\/sk\/projekt\/evolveum-use-of-ai-methods-in-identity-and-access-management\/","title":{"rendered":"Evolveum: Use of AI methods in Identity and Access Management"},"content":{"rendered":"<div id=\"\" class=\"element core-heading\">\n<h5 class=\"wp-block-heading\">Identity and access management (IAM) deals with managing identities in cyberspace. IAM has difficulties scaling for large organizations given a huge number of users and their roles there. In this project, we analyze the possible uses of AI in IAM.<\/h5>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p><a href=\"https:\/\/evolveum.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Evolveum<\/a> is a developer of the open-source software <a href=\"https:\/\/evolveum.com\/midpoint\/\" target=\"_blank\" rel=\"noreferrer noopener\">midPoint<\/a>, a unique solution combining identity management and identity governance with focus on technological and business requirements. Clients of midPoint have thousands (even tens of thousands) users with dozens of identities in different systems. This situation can be difficult to manage by hand. Some tasks like role mining, correlation of identities or outlier detection exhibit some level of repeatability in them.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>This repeatability presents an opportunity to use AI methods to automate such tasks. However, AI in such a critical branch of IT should be applied with care. Hence, as the first step, the main goal of this project is to analyze the situation in IAM and possibilities of responsible use of AI in the midPoint solution. <strong>The goal is to identify possibilities of AI use from which clients can have real benefits.<\/strong>\u00a0During our work and consultation, it will be important to take compiance with regulations and frameworks (e.g., ISO 27001, PCI DSS, HIPAA, NIST SP 800-53, GDPR, NIS) into account.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element core-paragraph\">\n<p>We will apply our AI expertise, together with Evolveum\u2019s domain knowledge, to identify the best use of AI in the IAM domain where almost all the data is highly sensitive.<\/p>\n<\/div>\n\n<div id=\"\" class=\"element acf-memberquote\"><section class=\"memberquote \" style=\"background-color: #ebf7f9;\">\n\t<div class=\"wrapper-out\">\n\t\t<div class=\"in cf\">\n\t\t\t<div class=\"inner cf\">\n                        \t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n<\/div>\n\n<div id=\"\" class=\"element acf-members\">\n<section class=\"members \" >\n\t<div class=\"wrapper-out\">\n\t\t<div class=\"wrapper-in\">\n\t\t\t<div class=\"in cf\">\n\t\t\t\t<div class=\"element-inner\">\n\t\t\t\t\t<div class=\"headline\"><h2>Project team<\/h2><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"members-wrap members-grid members-grid-4\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"member\">\n\t\t\t\t\t\t\t\t<div class=\"inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"picture\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kinit.sk\/sk\/clen\/peter-pistek\/\"><img decoding=\"async\" data-src=\"https:\/\/kinit.sk\/wp-content\/uploads\/2021\/10\/pistek-2_51330459695_o-255x341.jpg\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 255px; --smush-placeholder-aspect-ratio: 255\/341;\"><\/a>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h5>Peter Pi\u0161tek<\/h5>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"position\">Researcher 10\/2020-07\/2024<\/div>\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!--<a href=\"https:\/\/kinit.sk\/sk\/clen\/peter-pistek\/\" class=\"more\">Viac<\/a>-->\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"member\">\n\t\t\t\t\t\t\t\t<div class=\"inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"picture\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kinit.sk\/sk\/clen\/daniela-chuda\/\"><img decoding=\"async\" data-src=\"https:\/\/kinit.sk\/wp-content\/uploads\/2021\/10\/chuda-web_51328736302_o-255x341.jpg\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 255px; --smush-placeholder-aspect-ratio: 255\/341;\"><\/a>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h5>Daniela Chud\u00e1<\/h5>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"position\">Researcher<\/div>\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!--<a href=\"https:\/\/kinit.sk\/sk\/clen\/daniela-chuda\/\" class=\"more\">Viac<\/a>-->\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"member\">\n\t\t\t\t\t\t\t\t<div class=\"inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"picture\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/kinit.sk\/sk\/clen\/kamil-burda\/\"><img decoding=\"async\" data-src=\"https:\/\/kinit.sk\/wp-content\/uploads\/2021\/10\/burda-1_51330194184_o-255x341.jpg\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 255px; --smush-placeholder-aspect-ratio: 255\/341;\"><\/a>\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h5>Kamil Burda<\/h5>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"position\">Researcher<\/div>\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<!--<a href=\"https:\/\/kinit.sk\/sk\/clen\/kamil-burda\/\" class=\"more\">Viac<\/a>-->\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section> \n<\/div>","protected":false},"featured_media":26297,"template":"","meta":{"_acf_changed":false,"footnotes":""},"categories":[142,415],"class_list":["post-26298","project","type-project","status-publish","has-post-thumbnail","hentry","category-2023-sk","category-industry-research-project-sk"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Evolveum: Use of AI methods in Identity and Access Management - KInIT<\/title>\n<meta name=\"description\" content=\"Identity and access management (IAM) deals with managing identities in cyberspace. IAM has difficulties scaling for large organizations given a huge number of users and their roles there. In this project, we analyze the possible uses of AI in IAM.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kinit.sk\/sk\/projekt\/evolveum-use-of-ai-methods-in-identity-and-access-management\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Evolveum: Use of AI methods in Identity and Access Management - KInIT\" \/>\n<meta property=\"og:description\" content=\"Identity and access management (IAM) deals with managing identities in cyberspace. IAM has difficulties scaling for large organizations given a huge number of users and their roles there. In this project, we analyze the possible uses of AI in IAM.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kinit.sk\/sk\/projekt\/evolveum-use-of-ai-methods-in-identity-and-access-management\/\" \/>\n<meta property=\"og:site_name\" content=\"KInIT\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-26T13:47:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kinit.sk\/wp-content\/uploads\/2023\/04\/202304_web_project_Evolveum_feature_image.png\" \/>\n\t<meta property=\"og:image:width\" content=\"3601\" \/>\n\t<meta property=\"og:image:height\" content=\"1885\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@kinit\" \/>\n<meta name=\"twitter:label1\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 min\u00fata\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/projekt\\\/evolveum-use-of-ai-methods-in-identity-and-access-management\\\/\",\"url\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/projekt\\\/evolveum-use-of-ai-methods-in-identity-and-access-management\\\/\",\"name\":\"Evolveum: Use of AI methods in Identity and Access Management - KInIT\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/kinit.sk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/projekt\\\/evolveum-use-of-ai-methods-in-identity-and-access-management\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/projekt\\\/evolveum-use-of-ai-methods-in-identity-and-access-management\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/kinit.sk\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/202304_web_project_Evolveum_feature_image-scaled.png\",\"datePublished\":\"2023-04-20T08:02:33+00:00\",\"dateModified\":\"2023-07-26T13:47:43+00:00\",\"description\":\"Identity and access management (IAM) deals with managing identities in cyberspace. IAM has difficulties scaling for large organizations given a huge number of users and their roles there. In this project, we analyze the possible uses of AI in IAM.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/projekt\\\/evolveum-use-of-ai-methods-in-identity-and-access-management\\\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/kinit.sk\\\/sk\\\/projekt\\\/evolveum-use-of-ai-methods-in-identity-and-access-management\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/projekt\\\/evolveum-use-of-ai-methods-in-identity-and-access-management\\\/#primaryimage\",\"url\":\"https:\\\/\\\/kinit.sk\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/202304_web_project_Evolveum_feature_image-scaled.png\",\"contentUrl\":\"https:\\\/\\\/kinit.sk\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/202304_web_project_Evolveum_feature_image-scaled.png\",\"width\":2560,\"height\":1340},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/projekt\\\/evolveum-use-of-ai-methods-in-identity-and-access-management\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/kinit.sk\\\/sk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Industry research project\",\"item\":\"https:\\\/\\\/kinit.sk\\\/category\\\/industry-research-project\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Evolveum: Use of AI methods in Identity and Access Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/kinit.sk\\\/#website\",\"url\":\"https:\\\/\\\/kinit.sk\\\/\",\"name\":\"KInIT\",\"description\":\"Vyu\u017e\u00edvame v\u00fdskum pre \u013eud\u00ed a priemysel\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/kinit.sk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Evolveum: Use of AI methods in Identity and Access Management - KInIT","description":"Identity and access management (IAM) deals with managing identities in cyberspace. IAM has difficulties scaling for large organizations given a huge number of users and their roles there. In this project, we analyze the possible uses of AI in IAM.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kinit.sk\/sk\/projekt\/evolveum-use-of-ai-methods-in-identity-and-access-management\/","og_locale":"sk_SK","og_type":"article","og_title":"Evolveum: Use of AI methods in Identity and Access Management - KInIT","og_description":"Identity and access management (IAM) deals with managing identities in cyberspace. IAM has difficulties scaling for large organizations given a huge number of users and their roles there. In this project, we analyze the possible uses of AI in IAM.","og_url":"https:\/\/kinit.sk\/sk\/projekt\/evolveum-use-of-ai-methods-in-identity-and-access-management\/","og_site_name":"KInIT","article_modified_time":"2023-07-26T13:47:43+00:00","og_image":[{"width":3601,"height":1885,"url":"https:\/\/kinit.sk\/wp-content\/uploads\/2023\/04\/202304_web_project_Evolveum_feature_image.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@kinit","twitter_misc":{"Predpokladan\u00fd \u010das \u010d\u00edtania":"1 min\u00fata"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/kinit.sk\/sk\/projekt\/evolveum-use-of-ai-methods-in-identity-and-access-management\/","url":"https:\/\/kinit.sk\/sk\/projekt\/evolveum-use-of-ai-methods-in-identity-and-access-management\/","name":"Evolveum: Use of AI methods in Identity and Access Management - KInIT","isPartOf":{"@id":"https:\/\/kinit.sk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kinit.sk\/sk\/projekt\/evolveum-use-of-ai-methods-in-identity-and-access-management\/#primaryimage"},"image":{"@id":"https:\/\/kinit.sk\/sk\/projekt\/evolveum-use-of-ai-methods-in-identity-and-access-management\/#primaryimage"},"thumbnailUrl":"https:\/\/kinit.sk\/wp-content\/uploads\/2023\/04\/202304_web_project_Evolveum_feature_image-scaled.png","datePublished":"2023-04-20T08:02:33+00:00","dateModified":"2023-07-26T13:47:43+00:00","description":"Identity and access management (IAM) deals with managing identities in cyberspace. IAM has difficulties scaling for large organizations given a huge number of users and their roles there. In this project, we analyze the possible uses of AI in IAM.","breadcrumb":{"@id":"https:\/\/kinit.sk\/sk\/projekt\/evolveum-use-of-ai-methods-in-identity-and-access-management\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kinit.sk\/sk\/projekt\/evolveum-use-of-ai-methods-in-identity-and-access-management\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/kinit.sk\/sk\/projekt\/evolveum-use-of-ai-methods-in-identity-and-access-management\/#primaryimage","url":"https:\/\/kinit.sk\/wp-content\/uploads\/2023\/04\/202304_web_project_Evolveum_feature_image-scaled.png","contentUrl":"https:\/\/kinit.sk\/wp-content\/uploads\/2023\/04\/202304_web_project_Evolveum_feature_image-scaled.png","width":2560,"height":1340},{"@type":"BreadcrumbList","@id":"https:\/\/kinit.sk\/sk\/projekt\/evolveum-use-of-ai-methods-in-identity-and-access-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kinit.sk\/sk\/"},{"@type":"ListItem","position":2,"name":"Industry research project","item":"https:\/\/kinit.sk\/category\/industry-research-project\/"},{"@type":"ListItem","position":3,"name":"Evolveum: Use of AI methods in Identity and Access Management"}]},{"@type":"WebSite","@id":"https:\/\/kinit.sk\/#website","url":"https:\/\/kinit.sk\/","name":"KInIT","description":"Vyu\u017e\u00edvame v\u00fdskum pre \u013eud\u00ed a priemysel","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kinit.sk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"}]}},"_links":{"self":[{"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/project\/26298","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/project"}],"about":[{"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/types\/project"}],"version-history":[{"count":2,"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/project\/26298\/revisions"}],"predecessor-version":[{"id":27637,"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/project\/26298\/revisions\/27637"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/media\/26297"}],"wp:attachment":[{"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/media?parent=26298"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kinit.sk\/sk\/wp-json\/wp\/v2\/categories?post=26298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}