The Ravens Blog
Huginn and Muninn

The OG Security Blog

Formally the IDM Rockstar blog, now our team consists of scholars, researchers, engineers, and developers, all with varying passions throughout the world of Information Security. The Ravens is a collections of information, ideas, and help that has been gathered from our decades of experience and most recent areas of research.

ADFS and Splunk
ADFS (Active Directory Federation Services) is a perennial issue in the enterprise world. Majority of the organizations still uses ADFS for their IdM (Identity Management) needs.
March 21, 2023
Services Engagement Adaptability
When starting Nyedis, my partner and I considered a multitude of things, recognizing that there are many IAM related elements that require proficiency and a high level of competence. Our goal was, and still is, differentiating ourselves from the “standard” Professional Services firm. On the top of the list was to make it easy, and a pleasant experience for our clients to do business with us, to truly partner for success.
March 21, 2023
Pitfalls of Lambdas
Lambda functions provide a way for you to run your code in the AWS cloud without having to manage servers, software, networking, or infrastructure. You are only responsible for our code, and you only pay for when your code runs. This can greatly reduce the total ownership cost, both financially and temporally, of your application, but there can be some "gotchas" that you should consider before you start writing your first lambda.
March 21, 2023
Smart Contracts Interaction via
How to write to a Smart Contract with simple Python
February 6, 2023
Technology or process, what is driving your IAM Initiatives?
When talking with clients considering an IAM assessment, it seems that many know what they want from a technology perspective, and usually have a good idea on the desired outcome. As we dive deeper into the discussions with them, we find that there is a perception of what needs to be done to embark upon a successful IAM journey, although more often than not, there is little consideration for current state and future state process.
February 7, 2023
Is a Large Scale Cyber Attack Going On Right Now?
A couple of our larger financial institutions have been facing some odd outages over the weekend and currently.
February 6, 2023
Don't Be Late to web3
October 20, 2022
How to Auto-Create Identities from SAML Assertion with ForgeRock AM and IDM
In this writeup, we will discuss how to perform custom SAML Assertion processing by writing a custom Java class for use with Federation in ForgeRock AM. In this example, a Ping Federate IdP is set up with federation with ForgeRock as the SP. The idea in this instance was to intercept the SAML assertion from an IdP initiated SSO process so that the contents could be passed on to ForgeRock IDM to provision the user account.
January 6, 2022
The Brown M&M Theory
December 15, 2021
Changing OAM Log Levels
December 16, 2021
Centrify Command Line Interface for Linux (CCLI)
I’ve been recently playing around with Centrify Linux DMC setup and my first question was, “Where is the cli for linux?”After an hour or so of looking around, I finally found the download for it.It was just released a couple months ago, so it’s pretty new as well and looks like your Tenant must be at least 20.3.
December 15, 2021
Setting up a Centrify repo on a Linux Box (RHEL)
I have a few RHEL7 instances setup in Google Cloud Platform (GCP) as a demo environment for a Centrify PAM setup. The first step in getting these things connected to the Centrify Tenant / Portal is to install the agent on the box. To make life easy, I like to use ‘yum’. So first up, install the Centrify repo to the server and then install everything I need.
December 15, 2021
Stating the Obvious
December 15, 2021
Know Your Software!
December 15, 2021
SSH Shortcut Gold!
December 15, 2021
LDIF Tools
December 16, 2021
Make OAM Silent!
December 16, 2021
When Sandboxes Go Bad
December 16, 2021
Where to download ODSEE
December 16, 2021
Terminal notification
December 16, 2021
You Get What You Pay For
Being in the Identity Management consulting business, we are approached all the time by various consulting firms looking to fill their clients IDM needs.
December 14, 2021
Privileged Access Management
Privileged access management or PAM for short is critical to any modern cybersecurity workflow. It's a subset of identity and access management (IAM) that focuses on user management. Why is this important? Because typically security control and management focus on the object the organization is managing and objectives that the organization is trying to secure. PAM extends that range to the individuals in the organization.
February 21, 2019
Web3 is the future. There is no denying the inevitable.It will give you back control and provide access to the internet from anywhere. It builds on existing technology that is commonly used everyday like smartphones and cloud applications. A crypto’s dream comes true, this makes the internet decentralized. Data would no longer be held only by large corporations. To really understand Web3, you must first understand what it means for something to be decentralized.
February 21, 2019
The software has changed, but your strategy hasn't. Let's help you fix that.
You've moved to the cloud, adopted containers, and have as much automation in place as possible. So why are you still planning and implementing using legacy methods and random people?
Level up your provider