NetIQ Communities

Start exploring, experiencing, and engaging with NetIQ customers and commentators in NetIQ Communities! From industry news in NetIQ Views, to technical how-tos in Cool Solutions, to connecting with NetIQ experts in our Support Forums, you can join the conversation today.

Our community includes 3 main areas

Join the conversation on social media
Subscribe to our newsletter

What's Happening...

Understanding Sentinel disk usage

Everyone knows that Sentinel is a great product, but with a great product comes great disk usage (even with secondary configured). This article is meant to be a guide only to how the disk is used and some recommendations that may assist in managing this disk usage. The sizes below are based on our single…

Manipulating node sets in IDM via Set Operations

Thanks to the power and simplicity of DirXML-Script tokens in Identity Manager, one can implement even quite complex policies, whilst only rarely needing to dig directly into the underlying XML. This was not always the case, especially in the first few versions of Identity Manager, which relied on XPath and XSLT…

Identity Manager Applications, PAT, and Firewall

Consider this common scenario: – The Identity Manager applications (IDMProv, osp, dash, landing, sspr) all running on the one instance of Tomcat, – You want to PAT (Port Address Translation) from 80/443 to 8080/8443 so you utilise common URLs without ports…

What’s New in Designer 4.5.1.1

Designer for Identity Manager can be updated online, which is a nice feature. With each new release they update the readme, but I never find the level of detail there sufficient to satisfy me. Thus I go digging to understand what they added and what it means to me. Since I am doing this for…

Active Directory and the Problem of Privilege

A quick scan through your daily email or favorite news site brings news of yet another data breach, inevitably brought on by either a mysterious hacker, organized cyber-criminal group or even a malicious insider. What do all of these identities have in common? In more and more cases, these identities have gained and misused privileged…

Integrating Access Manager with SharePoint server using WS-Federation and Claims based authentication

The most common approach to integrating Microsoft SharePoint Servers with Access Manager involves accelerating the SharePoint Web Server with the Access Gateway and using Identity Injection or Formfill to single sign on (SSO) users. NetIQ Access Manager (NAM) documentation includes details on how to…

What’s new in Validator for Identity Manager 1.4 – Part 4

I have been discussing the new features in Validator 1.4. I am working through the list of enhancements in the readme, and trying to explain what each of those items really mean.

Forwarding Sentinel events to BMC with MSEND

If your Enterprise Operations Management solution is the BMC suite, Sentinel can easily be configured to send correlated event information using the msend binary as an Execute Action. There is a catch though, the way the Execute Action sends Arguments (Bug # 944428) you can’t call msend directly. Instead you will have to call a…

What’s new in Validator for Identity Manager 1.4 – Part 3

I have been discussing the new features in Validator 1.4. I am working through the list of enhancements in the readme, and trying to explain what each of those items really mean. * HTTP and UserApp Connectors will import https certs into the keystore when you do Test Connection. This is a great feature. If…

PCI DSS Solution Pack: Sample Reports

PCI-DSS_2011.1r3-Sample_Reports.zip contains sample reports for the complete set of reports found in the Sentinel PCI DSS Solution Pack (version 2011.1r3).

Sentinel Core Solution Pack: Sample Reports

Sentinel-Core_2011.1r8-Sample_Reports.zip contains sample reports for the complete set of reports found in the Sentinel Core Solution Pack (version 2011.1r8).

Secure Configuration Solution Pack: Sample Reports

Secure-Configuration-Manager_2011.1r1-Sample_Reports.zip contains sample reports for the complete set of reports found in the Secure Configuration Solution Pack (version 2011.1r1).

GCV, Mapping tables and a real improvement in my code.

So with very little time before the start of the school year we were told we were closing four locations, opening two new locations immediately, with two more locations coming in the months to come. For me this meant a need to make code changes in IDM. The area of greatest concern was the large…

Customer Success: Craig Group Ltd.

When Craig Group Ltd. needed to provide simple, practical & easy-to-test disaster recovery capability, they turned to NetIQ. Read the story here:

Does the Internet of Things Mean the End of Privacy?

To embrace the Internet of Things, do we have to say goodbye to privacy?