Author: confluxadmin

Module Lead, Identity Management (Location: Pune, India) You will design and develop server-side software for our Identity Governance product suite. As a Core Server developer, you will be working on a Java EE based platform, Hibernate, Spring, REST on which we build multi-tier applications as well as a UI...

You will design and develop IAM integration solution to extend value of customers IAM investment. You will manage engagements, lead teams, and provide customers with valuable solutions to their IAM challenges Some of the things you'll be doing include… Design and Develop IAM solution based on...

Principal Product Lead, Identity Analytics      (Location: Pune, India) You will design and develop server-side software for our Identity Analytics Platform product suite. As a Core Server developer, you will be working on a Java EE based platform, Hibernate, Spring, REST on which we build...

Organizations must perform Access Certification to effectively meet audit and compliance requirements, and improve its overall risk posture. However with large number of applications and use access reviews, organization go through “access certification fatigue” i.e. Reviewers do not have entitlement information and context necessary to...

An application access is generally expressed as a business function/permission on a set of resources/assets/datasets. Each application has its own access control model (ACLs, RBAC, Discretionary/Mandatory access control etc.). To simplify administration, these fine grained authorization policies are published as a set of "entitlements". Application delegates...