Welcome to NetIQ Cool Solutions!  Explore what is possible with NetIQ products by seeing how product experts use them in real life.  Download purpose-built Cool Tools and see if they can help you streamline things.  Share your knowledge and earn Rewards Points.

Why get involved?

Submit articles and Cool Tools, and earn Rewards Points to spend at Amazon.

Sign up now

Subscribe to our newsletter

Latest Posts

Gartner predicts that by the year 2020, 26 billion devices will be connected to the Internet. All of these devices will make up the “things” of the oft-discussed Internet of Things (IoT). And the use of these connected devices, which can all communicate with each other, continues to expand. Even industries and communities that we…

+ read more

GeoffWebb
By: GeoffWebb
Jul 30, 2015
7:06 am
Reads:
456
Score:
Unrated

NetIQ Identity Manager (IDM) can connect to SAP systems in several ways. Both the SAP-HCM and the SAP User Management drivers require a SAP middleware called „SAP Java Connector“, „JCo3“ in short, to be installed and configured in addition to the IDM driver. NetIQ Documentation does not explain this in detail and only refers to…

+ read more

lhaeger
By: lhaeger
Jul 28, 2015
10:59 am
Reads:
83
Score:
5

A lot of times NetIQ IDM developers need to define workflows where a user can assign permissions. With IDM, permissions are defined using entitlements and assigned via resources, when you follow RBAC. However in the real world sometimes you cannot map everything with a Role and some entitlements have to be assigned manually on a…

+ read more

By: nsanson
Jul 28, 2015
8:56 am
Reads:
88
Score:
5

You probably know Larry Ellison as the founder and current CTO of Oracle. But he’s also passionate about sailing—although “passionate” may be an understatement. Scuttleboat Sailing News reports that Ellison spent an estimated $500 million competing in the 2013 America’s Cup. While this amount of money is way more than most organizations’ annual security budget,…

+ read more

Travis Greene
Jul 28, 2015
7:44 am
Reads:
416
Score:
Unrated

GCVs are immensely valuable components within an IDM solution. Use of GCVs can increase the configurability and reduce the amount of code customization required to both reproduce a solution, to move it between deployment stages (I.e, dev to test to production), and maximizes agility in case a solution’s name space or other factors need to…

+ read more

By: rrawson
Jul 24, 2015
1:02 pm
Reads:
113
Score:
5
This entry is part 3 of 3 in the series What’s New in Designer 4.5.1

In part 1 and 2 of this series I talked about some of the new things in Designer 4.5.1. In this article I will try and get through the rest of the items listed in the readme. The last new features is the following. Designer’s Document Generation feature now includes linked GCV objects. To display…

geoffc
By: geoffc
Jul 22, 2015
11:58 am
Reads:
136
Score:
Unrated

Standing in a long line can be reason enough for most people to avoid doing something, even if it’s something important like voting for government leaders. To increase participation, many are in favor of adopting an online voting platform to make voting easier and more convenient for citizens. After all, even the U.S. Department of…

+ read more

GeoffWebb
By: GeoffWebb
Jul 21, 2015
7:07 am
Reads:
474
Score:
Unrated

Redirection, which is required by many applications and services, inherently brings security risks to organizations. For instance, an “un-validated” redirect can allow an unsuspecting user visiting a trusted site to be redirected to a malicious site, therefore exploiting the users’ trust. Using a “whitelist” can help mitigate this vulnerability by…

ggilbe
By: ggilbe
Jul 14, 2015
10:43 am
Reads:
191
Score:
Unrated
This entry is part 2 of 3 in the series What’s New in Designer 4.5.1

After the release of IDM 4.5 the first patch came out. One of the components updated is Designer, with an online update (or downloadable ZIP file). When you chose to install the update it shows a list of fixes and enhancements….

geoffc
By: geoffc
Jul 10, 2015
12:36 pm
Reads:
227
Score:
Unrated

Introduction In order to allow additional users to use GPA, you’ll need to add them to the GPA security framework. Specifically, this means two things; they’ll need a repository user account (actually a SQL account), and they’ll need their AD account given permissions to objects in the GP Repo. How you’ve implemented GPA and where…

+ read more

Jul 8, 2015
2:19 pm
Reads:
188
Score:
5