Welcome to NetIQ Cool Solutions!  Explore what is possible with NetIQ products by seeing how product experts use them in real life.  Download purpose-built Cool Tools and see if they can help you streamline things.  Share your knowledge and earn Rewards Points.

Why get involved?

Submit articles and Cool Tools, and earn Rewards Points to spend at Amazon.

Sign up now

Subscribe to our newsletter

Latest Posts

Google Chrome book is gaining popularity especially among education institutes for various reasons. Some are, Google offers subscription at discounted cost for educational institutes. Google Admin Console Device management is simple and easy to control devices. Google provides number of services includes Mail, Google Drive, Calendar, Messenger, etc., as complete suite of services for an Organization. Redistribution of Chromebook is easy with powerwash, this deletes all data and reinstate the device as new.

By: cstumula
Apr 24, 2015
4:48 pm
Reads:
21
Score:
Unrated

In the previous article, I have explained the Botnets and free sites which offer a list of infected sites. Repeated here for readability “There are number of publicly available lists of known IP Addresses that are currently compromised. Various sites offer these lists for free. These hosts are running crimeware with Botnets. The…

Apr 21, 2015
12:01 pm
Reads:
154
Score:
Unrated

This post describes the method we used to migrate the database from MySQL to PostgreSQL for our JBoss based UserApp installations on SLES (IDM 4.0.2). This is achieved by reinstalling both JBoss with PostgreSQL and the UserApp, and then exporting the db from MySQL and importing it into PostgreSQL. Please note that the newly installed…

+ read more

By: lbert
Apr 20, 2015
2:09 pm
Reads:
96
Score:
5

Introduction   There are some requirements for enterprises such as policy restriction of client location to access Office 365 services. For example STS token has to be sent only for activesync client. Or allow only internal client IPAddress. Solution   Office 365 sends information about application name, client IP, useragent, proxy information to STS as…

+ read more

By: cstumula
Apr 20, 2015
1:59 pm
Reads:
86
Score:
Unrated
This entry is part 3 of 3 in the series Troubleshooting OSP in IDM 4.5

As I worked through a new Identity Manager 4.5 setup I was trying a number of things and ran across some interesting errors. This series of articles is meant to share what I found, hopefully with error codes for the Google cache. This way, if you run into this error on your own, you might…

+ read more

geoffc
By: geoffc
Apr 17, 2015
9:18 am
Reads:
122
Score:
5

Provide a know list of IP address from a simple text file. The file can be hand crafted. Or, can be downloaded from known set of vulnerable IP addresses. Configuring them in Administration Console is tedious. Use this tool to update a text file and see this is effected in “Risk Based Authentication” of NetIQ Access Manager

Apr 16, 2015
10:57 am
Reads:
147
Score:
Unrated

How is managing user access to IT resources like managing customer access to movies at a megaplex theater? Both megaplex managers and IT managers must weigh the cost of enforcing access rules. Megaplex rules generally prohibit theater hopping, the practice of paying to see one movie, then sampling other movies in the megaplex for free….

+ read more

Travis Greene
Apr 16, 2015
7:27 am
Reads:
365
Score:
Unrated

Previously I had posted a script for port redirection on the Identity Server. I’ve since found this doesn’t work too well when the local SLES firewall is enabled. The following is a better solution. First, create a Firewall Service file that contains the necessary ports to open (this assumes the Administration Console and Identity Server…

+ read more

ScorpionSting
Apr 14, 2015
1:09 pm
Reads:
130
Score:
5