Welcome to NetIQ Cool Solutions!  Explore what is possible with NetIQ products by seeing how product experts use them in real life.  Download purpose-built Cool Tools and see if they can help you streamline things.  Share your knowledge and earn Rewards Points.

Why get involved?

Submit articles and Cool Tools, and earn Rewards Points to spend at Amazon.

Sign up now

Subscribe to our newsletter

Latest Posts

Authorization policies are used when you want to protect a resource based on criteria other than authentication and you want Access Manager to enforce the access restrictions. Authorization policies are enforced when a user requests data from a resource…

Koushik Halder
Sep 20, 2017
8:41 am
Reads:
127
Score:
5

There is no shortage of opinions about the dynamics of hybrid cloud growth and its effect on IT organizations. As such, I found CRN’s 2017 purchasing survey to be a worthwhile snapshot of priorities placed in front of today’s CIO’s and where they are investing the most in. You’ll notice in the survey that 3…

+ read more

Kent Purdy
Sep 14, 2017
8:35 am
Reads:
155
Score:
Unrated

A Designer plugin that displays the version (as displayed in Help – About) and connect mode (NCP or LDAP) in the window title, defaulting to something like “Designer 4.6.1 (LDAP)”.

lhaeger
By: lhaeger
Sep 13, 2017
9:19 am
Reads:
194
Score:
5

Identity injection allows you to add information to the URL, Custom Header, or to the HTML page before it is posted to a Web server. The Web server uses this information to determine whether the user can have access to the resource, so it is the Web server that determines the information…

Koushik Halder
Sep 8, 2017
1:25 pm
Reads:
167
Score:
5

I haven’t blogged in quite some time. I was looking around at some of my old blogs and wondered if my account was still active. As you can see, I was able to log in. I figured, what the heck, why not do a blog… here you go! I’ve been doing a lot of work…

+ read more

Tobin Isenberg
Sep 5, 2017
2:55 pm
Reads:
192
Score:
2

Identity injection allows you to add information to the URL, Custom Header, or to the HTML page before it is posted to a Web server. The Web server uses this information to determine whether the user can have access to the resource, so it is the Web server that determines the information that…

Koushik Halder
Aug 31, 2017
9:51 am
Reads:
326
Score:
5

It is good to know that in the recently concluded essay contest on describing what’s great about Micro Focus products, the winning entry on IAM did deal quite a bit with the IDM Rest Driver. The best part about this driver is that it is Generic…

By: sdhaval
Aug 28, 2017
1:38 pm
Reads:
301
Score:
Unrated

During the month of July, we hosted an essay contest inviting employees and customers to describe why they loved using Micro Focus products. We received a number of great responses and are excited to announce the winners.

netiqcoolguys
Aug 17, 2017
10:20 am
Reads:
1,999
Score:
5
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow