NetIQ Communities

Start exploring, experiencing, and engaging with NetIQ customers and commentators in NetIQ Communities! From industry news in NetIQ Views, to technical how-tos in Cool Solutions, to connecting with NetIQ experts in our Support Forums, you can join the conversation today.

Our community includes 3 main areas

Join the conversation on social media
Subscribe to our newsletter

What's Happening...

It’s Mardi Gras for Identity Thieves: Mystique Malware and Much, Much, More

If the rate and intensity at which my identity has been stolen in the past three years keeps pace, by 2017, I might as well advertise my personally identifiable information (PII) in blinking neon pink sky-writing and throw Mardi Gras beads from the airplane. First, my grocery store’s loyalty program was breached. Then I was…

Hit the Road

The absolute best part of my job is being with customers. I love it. Whether I’m presenting to one customer, 500 or anything in between, I love spreading the good word of how Micro Focus | NetIQ solutions can help you run IT better. To that end, I’m very happy to announce our new IT Operations…

Troubleshooting OSP in IDM 4.5 – Part 2

Recently I spent a lot of time working through the new OSP (One SSO Provider) used in Identity Manager 4.5 for logging into the various Identity Applications (User Application, Catalog Access, Home and Provisioning Dashboard, Reporting, Access Review). When I work…

Are You Open for Business?

The most fundamental question for any business – Are we open? Not just the doors to the building but can we deliver the services that our customers contract with us for? IT is a challenge. In the previous post, we talked about making sure that all of your IT stuff is working. No red lights on…

Working with Contractor Risk: The In-Laws of IT

IT contractors are like in-laws. They may not be blood relatives, but they’re still considered family. Similarly, contractors aren’t standard, permanent employees, but they still work within your organization, making them a part of the organizational family. Some in-laws are dignified and contribute positively to the family; some in-laws dreadful and make holidays a nightmare….

Detecting Data Exfiltration – Who is watching your employees actions?

How do you know if your trusted employees are stealing sensitive data? Companies have to allow them access to do their jobs (Utilize USB Drives, Touch File Shares etc), but need to monitor their actions. With Change Guardian and Sentinel we can detect this and give real time alerts. In today’s example we are watching for someone…

Sign up to take user tests, and earn Amazon gift cards

We on the corporate web team are enhancing the usability of our websites and building some brand new ones, and we would love the help of the Cool Solutions community members.

OpenID Connect with the NAM Identity Server and Oauth2 Playground

Oauth 2.0 is an open standard protocol for authorization that enables an application to access certain user information or resources from another web service, without giving the user’s credentials for the web service to the web application.

Troubleshooting OSP in IDM 4.5

With the release of the gemstone projects for IDM 4.02, and built into IDM 4.5 NetIQ changed the method for logging into the Identity Applications. The Identity Applications are generically considered the set of…

Customer Success: Interroll

Expansion can mean an IT headache. Interroll’s success with Identity Manager shows that it doesn’t have to be

How to set up an untrusted domain to be managed by Group Policy Administrator

One of the most powerful things about Group Policy Administrator is the ability to manage multiple domains and even untrusted domains and forests. The video walks through how to configure an untrusted domain to be managed by NetIQ GPA.

Did you Think to include RBA in your Mobile Strategy?

The old days of user access are gone Taking a least-privileged user approach for access control goes a long way in protecting your organization. But in today’s connected and mobile world, securing access purely from user permission level is not enough. Context needs to play a foundational role for assessing the risk of honoring those…

Insider Threats: Are you in denial?

If you think insider threats aren’t a problem…you should probably read this paper immediately.

Service Outages: Is Your Current Monitoring Solution Really Working?

One key to improving customer satisfaction? Reducing service interruptions.

Creating an Effective Mobile Authentication Strategy

With properly implemented access control, organizations can take advantage of the benefits of BYOD while minimizing the risk of data breaches. Learn three important aspects of mobile authentication.