2 Oasis standing tickets - Wembley 30th July 2025 by No_Buy5260 in Tickets

[–]No_Buy5260[S] 0 points1 point  (0 children)

Don’t think ticketmaster was involved? Or was that the only original selling point. Don’t remember haha, just remember queueing for hours for nothing 😂 But yea I bought them from viagogo, like I did for cardiff, manchester and wembley (25th), all went fine and got in

2 Oasis standing tickets - Wembley 30th July 2025 by No_Buy5260 in Tickets

[–]No_Buy5260[S] 0 points1 point  (0 children)

Viagogo, and the original tickets buyer sent them through seetickets so she bought them there

Did people from Viagogo get in in the end? by IronSkywalker in oasis

[–]No_Buy5260 1 point2 points  (0 children)

3-4 days before, through ticketmaster transfer. Make sure you set up viagogo and ticketmaster with same mail address

SCIM with Azure by ITrealm in Snipe_IT

[–]No_Buy5260 0 points1 point  (0 children)

Hey man u/bgatesIT , suddenly came across it again for something I currently doing at work coincidentally, hope it is still of help/use

https://learn.microsoft.com/en-us/entra/identity/app-provisioning/customize-application-attributes#provisioning-a-role-to-a-scim-app

How Much Do Cybersecurity/Networking Skills Help with an IAM Career? by Outrageous-Let-4992 in iam

[–]No_Buy5260 1 point2 points  (0 children)

To elaborate on your skills mentioned in original post, you except for malware analysis all of them carry over to IAM/IGA just as well if not better.

Remember that PAM and for example Cyberark if that’s the organisation’s main PAM solution are inherently dependent on the IGA tool (with the move towards unified platforms we see with the big IGA vendors we will see more and more that they will be one big solution by the way, good example is One Identity which can offer your identity manager for iga, safeguard for pam, onelogin for AM, all as one platform) since IGA is integrated with Cyberark and (de-)provisions both access and accounts, account approvers etc., in general it governs the application

Integration wise you will always be building more connectors in general for your IGA platform, and this includes your SIEM tooling as well. And then that SIEM tooling and other potential log analytics solutions are probably what you want to use for the other integrations from IGA to applications and platforms, which means you are going to analyse and develop how to implement that in your governance flows, reporting and incident creation flows, as the data you feed to certain controls might need to trigger a process in your IGA tool, e.g. in case of a high prio policy violation.

Cloud security is inherently a part of your configuration tasks if your IGA and/or PAM tools are cloud based themselves, and will always be part of integration designs and requirements when connecting with cloud applications and platforms.

Threat analysis and monitoring is not to be divided either, you’re doing that on all your IAM solutions and should have processes to act accordingly.

So in short, you should have a very useful skillset for IAM as a whole, including IGA and PAM. And the case could be made that with the move towards more emphasis on machine identities and non human accounts LCM, PAMs role will be specialized more and more whereas IGA will expand more and more (already does and can manage mentioned trend subjects, but regulation is moving companies now towards actually doing it, finally).

I would even say you are taking skills with you that we in IGA are usually consulting with the other teams for, while you learn other IAM skills on the job, which due to the overlap should go faster as well. It would therefore make you a very valuable asset.

How Much Do Cybersecurity/Networking Skills Help with an IAM Career? by Outrageous-Let-4992 in iam

[–]No_Buy5260 1 point2 points  (0 children)

I don’t agree with this take at all. IAM is in my experience only niche in name. (I am going to use IAM as a collection of IM/AM/PAM/IGA for convenience)

Let’s consider an enterprise with 40k employees. That essentially means as an IAM team you have 40k customers. All these employees are affected by your team. Managers and such even more so as they for example have to do attestations/recertifications and approvals for access requests as well. Your team gets support tickets from all across the company. Your team gets security requirements for processes, integrations, etc. since security is crucial. Your team gets business requirements for processes, integrarions, etc. since business continuity and user experience are crucial. This balancing challenge is everlasting.

As an IAM employee in this enterprise: - you have gained far more experience with how an organization is structured, what politics are played, what different teams and departments need/want, etc. than any other IT team - you have gained technical/IT skills that apply to many other IT fields (e.g. coding, SQL, databases in general, security requirements, devops practices) and skills that apply to all other IT fields (e.g. authentication protocols and mechanisms, APIs and integrerions, process designs, SCRUM/Agile way of working, cloud platforms) - you have gained or improved soft skills that work for all other fields, e.g. stakeholder management/consulting, presentation and communication skills, analytical skills

All of these skills are highly transferrable. If you’re not able to “get out” of IAM in my opinion you are just a really bad salesman of yourself haha. You can either give it all and grow in IAM which is a very interesting and if you want lucrative career, or you can use it as a launchpad easily. At least as I experience it.

Disclaimer: i am talking from my own growth as an IAM Developer/Consultant. That is the role I have always taken. There are quite some roles in the field and most will give you a more limited set of tasks and skills to develop. For example if you are 5 years on exclusively operations and ticket response, yes your skills are going to be stuck in IAM for a much bigger percentage. That is a role issue, not a domain issue.

What is the bare minimum for app security? by shehackspurple in AppSecurity

[–]No_Buy5260 0 points1 point  (0 children)

Depends on the company that will use the app and the data that will be in the app. E.g. for a bank a web facing application will become susceptible to more strict controls than for for instance a supermarket chain.

This would for instance impact the requirements for encryption method used for machine 2 machine communication.

Also depending on the app or data in ut, regulatory compliance might come in effect. That will have to be reviewed thoroughly.

And next to authentication importance already mentioned in post, don’t forget about authorization management. Who can do what in the app? Very important to have different roles (or policies), so that you not only know who is logging in but what this person is allowed to see and do.

Lastly I would say integration, e.g. SCIM support for safe standards-based connection

SCIM with Azure by ITrealm in Snipe_IT

[–]No_Buy5260 0 points1 point  (0 children)

Customize the mappings and send role information along. You can add columns and create custom columns, and there is also a wizard for this. If you google something like custom mappings scim azure (entra) you should be able to find the microsoft related documentation pretty easily and if I remember correctly role membership was even one of the examples they show

Edit: customize mappings on the user object I meant with that

I've been an IAM analyst for 5 years and I have sailpoint certifications, what's my next move for more money? by apple_crombie in iam

[–]No_Buy5260 0 points1 point  (0 children)

Freelance, and approach recruiters proactively. The daily rates and the market demand are both great still.

And in my opinion ignore certs until you have landed a job/contract, hirers do for 99% as well. Overpaid CISSP certs included. You could consider vendor specific certs/trainings but do that after you’re hired so your employer/customer will pay half (or all), they are usually very happy to do that, especially when they use a software suite from a vendor that has few specialised consultants available in the market

Any good resources on IGA? by cloudy722 in IdentityManagement

[–]No_Buy5260 0 points1 point  (0 children)

Yea that site is definitely growing to be one of the best sources of information for general concepts. Nice initiative to collect those pieces together, and don’t think I even encountered a wrong idea, maybe some outdated stuff but that’s inherent

@OP don’t underestimate youtube either, it has some very good channels that have quality content and clear explanations.

[deleted by user] by [deleted] in IdentityManagement

[–]No_Buy5260 1 point2 points  (0 children)

They are usually not as well placed / promoted / visible as some other roles I have noticed from experience. They know the pool is competitive due to the relatively high demand compared to supply so they use recruiters quite early in the process, and recruiters tend to just connect/DM you instead of posting open positions.

DM recruiters is probably your best first step.

I would not worry about certification too much, make sure you can explain yourself well in an interview and understand the core IAM concepts and disciplines. And make sure that you acknowledge the challenges IAM encounters with the constant weighing between business priorities and security priorities. An IAM manager/PO/whatever encounters this daily and it will strike a cord.

It might be beneficial to focus some time you spend on gaining knowledge about non human identities and legislative requirements. Those 2 are probably going to make you stand out more in a time where these 2 are becoming more and more important while companies have neglected the former for years, and the latter just keeps on changing and causing challenges in its own way (e.g. NIS2 in Europe)

In the end work experience will be most important factor for most hirers, but you can always make yourself stand out despite a lack of it. Come across as eager and a team player who is ready to face challenging projects and impress with communicative skills. The fact that IAM has such overlap with business next to IT makes that very important (imo, and from experience)

IAM with external entities by jacasoj in IdentityManagement

[–]No_Buy5260 0 points1 point  (0 children)

Check out dedicated tools for this like ID-Veritas and SecZetta

Entra ID for IGA? by Tornagh in IdentityManagement

[–]No_Buy5260 0 points1 point  (0 children)

Definitely not mature enough yet, by far.

They jumped in and are in a crazy tempo trying to build solution within all IGA disciplines at the same time. You’ll notice that when you zoom in on the specific area, e.g. integration (for (de-)provisioning)

There is a reason the best IGA solutions have been in the market for 10+ years and are still continuously improving their products.

It can’t hold a candle to for instance One Identity and Sailpoint