Become Part of our Team and Push Digital Sovereignty
- Teamleader IT / Project Manager (m/f/x)
- IT Consultant (m/f/x)
- Outbound Sales Represantative (m/f/x)
- a.m.m.

The piloting will take place with selected school authorities, starting in the school year 2021/2022. Afterward, BILDUNGSLOGIN will be connected to all leading public and private school administration and learning management systems.
Kevin Dominik Korte, President of Univention North America, has published an article on Via Satellite in which he reports on the challenges faced by many space companies in adapting their IT systems to rapidly growing corporate structures.
Have you ever thought about what happens to your data when hosted by big cloud providers? Especially companys often have to weigh up between convenience and security of sensitive employee- and customer data. Kevin Dominik Korte, President of Univention North America, talks about these challenges in an article published in Forbes Magazine.
The eighth point release of UCS 4.4 provides preparations for the upgrade to the forthcoming UCS 5.0, performance improvements in large environments, and improvements in the App Center, AD, and S4 Connector. In this article, I would like to present the most important innovations.
Kevin Dominik Korte, President of Univention North America, has written an article for SatMagazine. In said article, he talks about the general importance for satellite companies to keep their data safe and secure at all cost – and the challenges that come along with that necessity.
Almost ten years have passed since we published the first Cool Solution for UCS 3.0: in 2011, on November 25 at 8:02 am, we created a new page in the Univention Wiki which collects the Cool Solutions for the different versions of Univention Corporate Server. A lot has happened since then: Many instructions are now available in English and no longer in German, and there is a separate section for the Cool Solutions in the Univention forum.
In the first section of this article, “Typical Configuration Options”, I will be using an example to demonstrate the sort of information typically required to perform user authentication against the UCS LDAP. I will be taking you through the necessary configuration steps using the project management system Redmine as an example, as this requests all the typical information.
In the second section, “Types of Search Users”, I will detail the possibilities available to you if it is not possible to search through the UCS LDAP anonymously.