NetIQ Communities

Start exploring, experiencing, and engaging with NetIQ customers and commentators in NetIQ Communities! From industry news in NetIQ Views, to technical how-tos in Cool Solutions, to connecting with NetIQ experts in our Support Forums, you can join the conversation today.

Our community includes 3 main areas

Join the conversation on social media
Subscribe to our newsletter

What's Happening...

Approaches to changing Micro Focus/NetIQ delivered packages

With the introduction of Identity Manager 4, NetIQ added a new feature I really like called Packages. Previously, driver configurations were made available as large XML files that defined everything about the driver. This worked fine for a while, but it meant that pushing out minor fixes was hard. Upgrading driver configuration versions was very…

Thar She Blows: Mitigating Whaling Risk

CIO recently reported that a variant of spear phishing called whaling has emerged as a major cybersecurity threat. Whaling is a social-engineering scheme that uses the relationship between executives and employees to trick employees into taking an illicit action. An attacker masquerading as an executive bids, and the employee does his or her bidding. Notable…

Power of RunSQL KS from new AppManager SQL server module – Part 3 (SQL Jobs monitoring)

This is the third post in a series in which I will explain how an SQL job is performing on a daily basis using the power of RunSQL KS from the new AppManager for SQL server module. One of the problems with my SQL server, I face is to find how the SQL jobs are performing…

The IP2Location 2011.1r1 feed plug-in is released

The IP2Location 2011.1r1 feed plug-in is released. New feed plug-in and replaces the Generic IP Geolocation Service Collector. Allows you to convert IP Location Database files downloaded from ip2location.com to a Sentinel map file.

How to avoid Decoding Error: sun/io/ByteToCharConverter with JDK 1.8, iManager 2.7.x, and SecretStore Administration Plug-ins 3.4.x

During the upgrade from IDM 4.0.2 to 4.5 IDM needs JDK 1.8, but if you run your iManager with JDK 1.8 and try to make use of the SecretStore plugin, you will see this error: Error: Monitor SecretStore failed. -1 Decoding Error: sun/io/ByteToCharConverter…

What’s new with AppManager Modules

AppManager is a constantly evolving product. The product area with the fastest change is the monitoring module packs. I often encourage customers to go to the modules page and sort by published to review what has been released and see if any of the updates would apply to their environment. (See the link below mynetiq…

Aegis ‘Depot’ Activity – Get Value from List Activity

The Get Value from List Activity has been knocking around my lab for a few years, pretty much without a purpose in many ways outside of my environment. The reason for this is it accepts a list at input, and well no activity or other source available in the product or here on the Community…

Aegis Workflow 101 – Debug Mode

Welcome to Part 8 and the final topic on Aegis 101. A line had to be drawn as to what would make it into 101 and it ends here with a topic I’ve had a love/hate relationship with since its arrival, but I am now finally (almost) a convert! Debug mode. Simply put, Debug Mode allows…

Salesforce Delegated Authentication with Access Manager

Salesforce supports different types of authentication methods, these include Salesforce local authentication, SAML, OpenID Connect and Delegated authentication. NAM 4.0 and above can be used for Salesforce Delegated authentication.

Sentinel Plug-ins are released

Microsoft IIS Collector 2011.1r4, VMware ESXi Collector 2011.1r4, Fortinet FortiGate Collector 2011.1r3, and Cisco Switch and Router 2011.1r5 plug-ins have been released. Find out more here…

Rockin’ Role-Based Security – Least Privilege

With over 40,000 attendees, 500 exhibitors, and hundreds of sessions, this year’s RSA Security Conference was the place to be for anyone interested in keeping their networks, systems, and information safe from threats, including insider threats; which in turn got me thinking about least privilege. According to a survey done at the conference by Bromium,…

Aegis Workflow 101 – Triggers

Welcome to Part 4 of Aegis Workflow 101. This time we look at Triggers which define the conditions when workitems should start as well as well as other behavior which we will learn about below.

Aegis Workflow 101 – Events

Welcome to Part 3 of Aegis Workflow 101. This time we look at Events which act as signals to Aegis to perform some action, from meeting the criteria to starting a workitem to signalling a workitem should end.

Considerations in Recreating a Certificate Authority

eDirectory comes with PKI (Public Key Infrastructure) components built in. The most obvious manifestation of this is the Certificate Authority that is created on the first server in each tree. This is used to make X.509 Certificates that are used by eDirectory for a number of services.

Aegis Workflow 101 – Input Builder

Welcome to Part 2 of Aegis Workflow 101. This time we look at Input Builder which is a basic but very powerful component of Aegis workflow design.