Need profession consulting services? Anything from Assessments to Architecture Design to Implementation and Development is possible. Please contact me if interested.


If you have an idea or topic that you'd like to see a blog post about, please don't hesitate to contact me. I'd be more than happy to explore.

About Alex Stanciu

Eat, drink, sleep all things IDM. Find me on Twitter
6Oct, 2014

Troubleshooting LDAP with LDAPDecoder

By |October 6th, 2014|Tools|0 Comments

If you’ve never used, or heard of, LDAPDecoder, then you

3Oct, 2014

OIM: LDAP: error code 53 – Full resync required – Cookie something something

By |October 3rd, 2014|Identity Governance|0 Comments

If you see this error in OIM:

I assume you also

2Oct, 2014

OID: Fix Corrupt Schema Entry By Editing the OID Database

By |October 2nd, 2014|Directory Services|0 Comments

I recently saw an OID installation that had a corrupt

24Sep, 2014

OUD: Exploring Virtual Attributes and Transformations – #1

By |September 24th, 2014|Directory Services|0 Comments

In this series of posts I’m going to explore some

18Jul, 2014

Installing JDeveloper on OS X Mavericks (10.9)

By |July 18th, 2014|Tools|6 Comments

If you’ve found this post by searching the internet, then

16Jul, 2014

OIM Login Loop in Chrome

By |July 16th, 2014|Identity Governance|4 Comments

If you’re using OIM R2PS2 with Chrome, you may have

30Mar, 2014

Apache Directory Studio 2.0 Released

By |March 30th, 2014|Directory Services, Tools|0 Comments

I’m happy to see version 2.0 of Apache Directory Studio

25Mar, 2014

Add OUD Authentication Provider in Weblogic Using a WLST Script

By |March 25th, 2014|Access Governance, Directory Services|2 Comments

Here’s a quick script that will add the OUD Authentication

12Mar, 2014

Deploying the IAM Suite with the Deployment Wizard

By |March 12th, 2014|Access Governance, Directory Services, Identity Governance|56 Comments

With the release of Identity & Access Management suite R2

12Mar, 2014

OAM: Script to Delete the IAMSuiteAgent Programmatically

By |March 12th, 2014|Access Governance|0 Comments

In almost all deployments I’ve seen, no one ever uses