NetIQ Communities

Start exploring, experiencing, and engaging with NetIQ customers and commentators in NetIQ Communities! From industry news in NetIQ Views, to technical how-tos in Cool Solutions, to connecting with NetIQ experts in our Support Forums, you can join the conversation today.

Our community includes 3 main areas

Join the conversation on social media
Subscribe to our newsletter

What's Happening...

Getting Started with OSP – Part 5

In the previous articles in this series I was discussing what should be known to get started with OSP and started reading through the osp.log of a server starting up. It is interesting to see all that goes on under the covers to get a good feel for what is going right. When something goes…

Audit Platform Agent for non-root eDirectory server

Novell Audit Platform Agent 2011.1r3 allows non-root installation. Steps to configure PA for non-root eDirectory server…

XDAS Auditing for Successful and Failed Login Events

From eDirectory version 888Patch9 and 902 we can monitor successful and failed login events through XDAS auditing with the help of the latest eDirectory Collector (2011.1r7) and NMAS Collector (2011.1r4). Modify the Directory System to…

Buddy the Elf, What’s Your Favorite Color: Five Elf Quotes That Actually Relate to IT Security

The Holidays are here and one of my all-time favorite traditions is catching up on my all-time favorite holiday movies. AND my ALL-TIME FAVORITE holiday movie is Elf. Buddy’s trip from the North Pole workshop down to New York City and his adventures there had me thinking about my every day grind. The day in…

Identity Manager Vault Report

I decided that it would be helpful to produce a monthly report about our Identity Vault and its accounts and groups. So I began to write a shell script to produce my report. To start with…

Exploding Log Files on NAM 4.2

Detailed log files are great for troubleshooting. But if they get too large, you’re going to have a bigger problem than what you’re using the log files for – troubleshooting. If the log files consume the disk, you’re in a world of hurt, along with unnecessarily alarming the infrastructure team…

Reading through the OSP log – Part 3

In the last two articles I was working through OSP log from an issue I had. Much of it worked properly and is useful to review to see what a properly working OSP session should look like. Reading through the logs offers some interesting insights into the product you would not see elsewhere so I…

LDAP Unique Connections

So I have provided LDAP servers for our Web Team for a long time. We have bought some new Firewalls and we are going to transition from our old DMZ to the new DMZ. I have a server dedicated to LDAP and…

New Analytics Server in Access Manager 4.3

With Access Manager 4.3, you will get an out-of-box Audit Server, default Reports, and Analytics Dashboard. This new capability can be achieved by installing a new appliance. If you already have an auditing infrastructure, you can forward raw events to this new appliance and use “Analytics Dashboard”.

Sentinel Collectors are released

Microsoft SQL Server Collector 2011.1r5 and Micro Focus Open Enterprise-Server Collector 2011.1r1 have been released. Find out more…

Control Freak: Who’s in Charge of Access Provisioning?

Join the webinar on December 1, 2016. Like the title says, I’m a control freak—a true, blue, self-professed “control freak”. Whether its work, home, or play, I need to feel in charge of what I’m doing in all situations. I’m a working mom that thrives on multi-tasking. I clean before the…

Unix Agent 7.4 Hotfix 7018104 (p74p12) is released

Hi all, Unix Agent 7.4 Hotfix 7018104 (p74p12) is released. This patch updates the Secure Configuration Manager UNIX Agent 7.4 with the following scripts which are used to enable security checks…

Why Protect Corporate Identities?

I don’t know about you, but every few months someone steals my credit card number, and I end up with a new card. It is no longer a question of if someone can get my personal information, but when. We all go to work every day to provide for our families. And in the blink…

Walking through an Integration Activity in User Application – Part 2

In the first part of this article I discussed I would be reading through and explaining what I see in an example of the Integration Activity trace in User Application. The SOAP function I am trying to call is createRole, so that when a Business Unit code is sent in via our HR driver we…

Enforcing SSL (TLSv1.2) JDBC Connection via jTDS JDBC driver

With the introduction of TLSv1.2 support for MS SQL servers (MS Tech Doc) one may notice that the Identity Manager JDBC connector may stall trying to make SSL connection to the MS SQL database using the jTDS third party drivers. The driver trace may show something like below…