NetIQ Communities

Start exploring, experiencing, and engaging with NetIQ customers and commentators in NetIQ Communities! From industry news in NetIQ Views, to technical how-tos in Cool Solutions, to connecting with NetIQ experts in our Support Forums, you can join the conversation today.

Our community includes 3 main areas

Join the conversation on social media
Subscribe to our newsletter

What's Happening...

LDAP Unique Connections

So I have provided LDAP servers for our Web Team for a long time. We have bought some new Firewalls and we are going to transition from our old DMZ to the new DMZ. I have a server dedicated to LDAP and…

New Analytics Server in Access Manager 4.3

With Access Manager 4.3, you will get an out-of-box Audit Server, default Reports, and Analytics Dashboard. This new capability can be achieved by installing a new appliance. If you already have an auditing infrastructure, you can forward raw events to this new appliance and use “Analytics Dashboard”.

Sentinel Collectors are released

Microsoft SQL Server Collector 2011.1r5 and Micro Focus Open Enterprise-Server Collector 2011.1r1 have been released. Find out more…

Control Freak: Who’s in Charge of Access Provisioning?

Join the webinar on December 1, 2016. Like the title says, I’m a control freak—a true, blue, self-professed “control freak”. Whether its work, home, or play, I need to feel in charge of what I’m doing in all situations. I’m a working mom that thrives on multi-tasking. I clean before the…

Unix Agent 7.4 Hotfix 7018104 (p74p12) is released

Hi all, Unix Agent 7.4 Hotfix 7018104 (p74p12) is released. This patch updates the Secure Configuration Manager UNIX Agent 7.4 with the following scripts which are used to enable security checks…

Why Protect Corporate Identities?

I don’t know about you, but every few months someone steals my credit card number, and I end up with a new card. It is no longer a question of if someone can get my personal information, but when. We all go to work every day to provide for our families. And in the blink…

Walking through an Integration Activity in User Application – Part 2

In the first part of this article I discussed I would be reading through and explaining what I see in an example of the Integration Activity trace in User Application. The SOAP function I am trying to call is createRole, so that when a Business Unit code is sent in via our HR driver we…

Enforcing SSL (TLSv1.2) JDBC Connection via jTDS JDBC driver

With the introduction of TLSv1.2 support for MS SQL servers (MS Tech Doc) one may notice that the Identity Manager JDBC connector may stall trying to make SSL connection to the MS SQL database using the jTDS third party drivers. The driver trace may show something like below…

SMTP Integrator 2011.1r2 is released

The SMTP Integrator now supports the STARTTLS extension to SMTP for a secure communication between the integrator (client) and the SMTP server, per RFC 3207 standards…

Sentinel 7.3.4 is released

You can upgrade to Sentinel 7.3 SP4 from Sentinel 7.0 or later. Sentinel 7.3 SP4 resolves a Java deserialization (CVE-2016-1000031) vulnerability and also includes other software fixes, see the Release Notes for more information.

Several Sentinel Collectors are released

Microsoft DNS Collector 2011.1r2, Citrix NetScaler Collector 2011.1r4, Fortinet FortiGate Collector 2011.1r4, McAfee Host Intrusion Prevention Collector 2011.1r1, Oracle WebLogic Server Collector 2011.1r1, and more…

Have Your Cake and Eat It Too

Improve Engagement with External Users with SSO. Can you really “have” your cake and “eat” it too? I mean I have cake; I certainly can eat it. Simple, right? Not always. This phrase has created confusion for many years. In the very most literal form of the phrase, you can’t really retain your cake once…

nlpconfig: A CLI utility to work with LDAP Proxy configuration

NetIQ LDAP Proxy uses an XML configuration file nlpconf.xml. Sometimes it can get difficult editing the XML file repeatedly to try out policy combinations, complex condition flows, etc. This utility tries to make it slightly simpler by providing a shell friendly command line interface to view the configuration in a human-readable format on the console…

Avoid the Access Certification Jelly Bean Count

Updated with webinar links. Because certifying individual access is as tedious and inefficient as counting jelly beans, managers often validate every user’s access without really looking closely at it. This lack of attention means that some users might maintain inappropriate levels of access.

Reading through the OSP log file – Part 2

In the first part of this series I noted I would walk through the procedure a user login to OSP for IDMProv might take, and show a specific error I ran into. In the previous article I showed it rendering the login page, seeing the user is not authenticated, and then deciding to redirect to…