Welcome to NetIQ Cool Solutions!  Explore what is possible with NetIQ products by seeing how product experts use them in real life.  Download purpose-built Cool Tools and see if they can help you streamline things.  Share your knowledge and earn Rewards Points.

Why get involved?

Submit articles and Cool Tools, and earn Rewards Points to spend at Amazon.

Sign up now

Subscribe to our newsletter

Latest Posts

Koushik Halder shares a step-by-step process for creating a custom authentication class and how to perform authentication and authorization together. The class will also return authentication or authorization errors to the login form…

Koushik Halder
Oct 13, 2017
12:38 pm
Reads:
120
Score:
5

Geolocation dashboard shows a map with the number of logged in users in a specific geographical location. This solution will demonstrate how to use Maxmind Geolocation Provider with Analytics.

Koushik Halder
Oct 6, 2017
10:35 am
Reads:
217
Score:
5

FreeRADIUS is an effective and free product for setting up secure authentication to your wireless network by using the WPA2 Enterprise standard. You can use client certificates issued by the eDirectory Certificate Authority to authenticate your devices to eDirectory instead of using usernames and passwords. A benefit is that the password doesn’t need to be…

+ read more

Sep 28, 2017
11:04 am
Reads:
232
Score:
Unrated

Each IT environment is unique.  And while monitoring solutions often provide hundreds of agents to monitor different aspects of your environment (or take an agentless approach)—there is always a need to customize your monitoring solution to fit your IT environment.  Sometimes, this is done through configuration changes. However, configuration changes usually only get you so…

+ read more

wheaps
By: wheaps
Sep 27, 2017
12:56 pm
Reads:
351
Score:
5

Authorization policies are used when you want to protect a resource based on criteria other than authentication and you want Access Manager to enforce the access restrictions. Authorization policies are enforced when a user requests data from a resource…

Koushik Halder
Sep 20, 2017
8:41 am
Reads:
264
Score:
5

There is no shortage of opinions about the dynamics of hybrid cloud growth and its effect on IT organizations. As such, I found CRN’s 2017 purchasing survey to be a worthwhile snapshot of priorities placed in front of today’s CIO’s and where they are investing the most in. You’ll notice in the survey that 3…

+ read more

Kent Purdy
Sep 14, 2017
8:35 am
Reads:
244
Score:
Unrated

A Designer plugin that displays the version (as displayed in Help – About) and connect mode (NCP or LDAP) in the window title, defaulting to something like “Designer 4.6.1 (LDAP)”.

lhaeger
By: lhaeger
Sep 13, 2017
9:19 am
Reads:
323
Score:
5

Identity injection allows you to add information to the URL, Custom Header, or to the HTML page before it is posted to a Web server. The Web server uses this information to determine whether the user can have access to the resource, so it is the Web server that determines the information…

Koushik Halder
Sep 8, 2017
1:25 pm
Reads:
285
Score:
5

I haven’t blogged in quite some time. I was looking around at some of my old blogs and wondered if my account was still active. As you can see, I was able to log in. I figured, what the heck, why not do a blog… here you go! I’ve been doing a lot of work…

+ read more

Tobin Isenberg
Sep 5, 2017
2:55 pm
Reads:
283
Score:
2
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow