NetIQ Communities

Start exploring, experiencing, and engaging with NetIQ customers and commentators in NetIQ Communities! From industry news in NetIQ Views, to technical how-tos in Cool Solutions, to connecting with NetIQ experts in our Support Forums, you can join the conversation today.

Our community includes 3 main areas

Join the conversation on social media
Subscribe to our newsletter

What's Happening...

Identity Manager 4.6 – Migration Settings tool for exporting and importing client settings

This migration tool helps you migrate the client settings from one Identity Manager instance to another.

Identity Manager 4.6 Dashboard – Configuring Client Settings

IDM 4.6 Dashboard introduces a new feature to customize UI settings, behavior, branding, and access to the application through client settings. There can be multiple such client settings on a single identity manager instance and different sets of users can map to different clients. This would allow users to have a different look and feel,…

Mitigating “Super Human login” with Risk Based Authentication (NAM)

Current Access Manager Risk Based Authentication ( RBA ) mitigates risk of a login based on geo location of the user. For example if a user logs in from a known location A, one could configure to ask for X509 authentication instead of simple form based authentication. Another example, if a user logs in from…

Following a Role Grant in the RRSD Driver – Part 5

In the first four articles of this series, I discussed what you see in the Roles and Resources Service Driver (RRSD) when different events are triggered out of the User Application. When you are in the User Application, via IDM Home (which makes SOAP calls to the IDMProv interface) or in the classic User Application…

Integrating Identity Manager 4.5.4 User Application with Access Manager 4.3 Access Gateway

One of the primary deployment use cases for any IDM customer is to provide a single sign-on access to the User Application for their users from outside the enterprise, mostly for the employees working remotely. In this case, no customer would want to give direct access to IDM URL or keep the IDM in…

Help Drive the Direction of our Community Update Project

Help us improve our community and get a chance for a $500 Amazon gift card. Read on….. Micro Focus is working on plans to consolidate and update our community properties and we want our efforts to be customer driven so we’re asking you for input: SURVEY THANK YOU for taking a couple of minutes for…

NDSD Command Options in SystemD

Just when you think it is safe to go back in the water, someone throws in a Shark. I have spent some time getting familiar with the SysVinit processes, and how to run NDSD Command Options. Anybody familiar with troubleshooting eDirectory probably knows about this; rcndsd start -ndb That starts NDSD without loading the database….

Getting Started with OSP – Part 5

In the previous articles in this series I was discussing what should be known to get started with OSP and started reading through the osp.log of a server starting up. It is interesting to see all that goes on under the covers to get a good feel for what is going right. When something goes…

Audit Platform Agent for non-root eDirectory server

Novell Audit Platform Agent 2011.1r3 allows non-root installation. Steps to configure PA for non-root eDirectory server…

XDAS Auditing for Successful and Failed Login Events

From eDirectory version 888Patch9 and 902 we can monitor successful and failed login events through XDAS auditing with the help of the latest eDirectory Collector (2011.1r7) and NMAS Collector (2011.1r4). Modify the Directory System to…

Buddy the Elf, What’s Your Favorite Color: Five Elf Quotes That Actually Relate to IT Security

The Holidays are here and one of my all-time favorite traditions is catching up on my all-time favorite holiday movies. AND my ALL-TIME FAVORITE holiday movie is Elf. Buddy’s trip from the North Pole workshop down to New York City and his adventures there had me thinking about my every day grind. The day in…

Identity Manager Vault Report

I decided that it would be helpful to produce a monthly report about our Identity Vault and its accounts and groups. So I began to write a shell script to produce my report. To start with…

Exploding Log Files on NAM 4.2

Detailed log files are great for troubleshooting. But if they get too large, you’re going to have a bigger problem than what you’re using the log files for – troubleshooting. If the log files consume the disk, you’re in a world of hurt, along with unnecessarily alarming the infrastructure team…

Reading through the OSP log – Part 3

In the last two articles I was working through OSP log from an issue I had. Much of it worked properly and is useful to review to see what a properly working OSP session should look like. Reading through the logs offers some interesting insights into the product you would not see elsewhere so I…

LDAP Unique Connections

So I have provided LDAP servers for our Web Team for a long time. We have bought some new Firewalls and we are going to transition from our old DMZ to the new DMZ. I have a server dedicated to LDAP and…