Welcome to NetIQ Cool Solutions!  Explore what is possible with NetIQ products by seeing how product experts use them in real life.  Download purpose-built Cool Tools and see if they can help you streamline things.  Share your knowledge and earn Rewards Points.

Why get involved?

Submit articles and Cool Tools, and earn Rewards Points to spend at Amazon.

Sign up now

Subscribe to our newsletter

Latest Posts

This entry is part 2 of 2 in the series Adding New Functions to the UA Bash extension

Fernando Freitas of NTS fame wrote a great shell script extension to support the RBPM SOAP functions. The problem is he only implemented the Role service WSDL functions and there are many more in User App that might be needed. Specifically I need the createResource function from the Resource service WSDL. So how to extend it? Read this series, and continue on as I work through that process.

geoffc
By: geoffc
Feb 5, 2016
11:39 am
Reads:
74
Score:
Unrated

I’ve been meaning for a long time to do a series of posts on different ways of doing the same thing in Aegis, from using scripts, command line, builtin activities, custom activities and adapters and I finally got around to doing it. The question came up in the Aegis Support Forum asking “How can I detect accounts…

+ read more

Martin Cotter
Feb 4, 2016
9:30 am
Reads:
69
Score:
Unrated

Like most people, I understand reams of data best with graphics – pictorial images of what the data represents. So, rather than read through pages and pages of numbers, I can look at a graph to understand the trend the data represents. Another way to say this is – a picture is worth a thousand…

+ read more

Feb 3, 2016
2:01 pm
Reads:
127
Score:
Unrated

I would like to explain in my post about the power of easy customization using AppManager. I was going through the list of applications which can be monitored by AppManager. Though the list is huge, I was disappointed to see that there is no monitoring available for PostgreSQL, so I decided to do something on…

+ read more

Anmol Rastogi
Feb 2, 2016
7:42 pm
Reads:
83
Score:
Unrated

Introduction This cool solution explains the steps involved in configuring Access Manager for Auditing using Syslog on Windows Server 2012 R2  using Cygwin – a Unix like environment and a command line interface for Microsoft Windows. Need for Syslog for Auditing in Access Manager. With NAM 4.2, the legacy Platform Agent (PA) for auditing is…

+ read more

By: G Nataraj
Feb 1, 2016
11:30 am
Reads:
140
Score:
Unrated

User photos are used more and more by diverse systems and in many systems you can upload and change the photo yourself today. Many users do this and as many don’t. Depending on company policies some are not allowed to do it at all. After using a variety of tools to import photos I once…

+ read more

Feb 1, 2016
11:16 am
Reads:
132
Score:
5

Many start the new year hoping for better things. Many could probably learn a lesson or two from the following companies who suffered dearly during 2015. This list does not cover all of the major breaches of the year, but it does underscore the damage that was done with merely a handful of them. We…

+ read more

Feb 1, 2016
11:07 am
Reads:
124
Score:
Unrated
This entry is part 1 of 2 in the series Adding New Functions to the UA Bash extension

Fernando Freitas, of Novell Technical Support fame, wrote a very very useful shell script that adds command line like functions to make some of the SOAP calls found in the User Application. Previous to this, it was a bit hard to do bulk operations on things that needed to be done via the SOAP calls….

+ read more

geoffc
By: geoffc
Jan 29, 2016
9:22 am
Reads:
110
Score:
5

This Collector provides data-capture capabilities for Cisco ISE and related products.

Jan 29, 2016
8:48 am
Reads:
88
Score:
Unrated
This entry is part 3 of 3 in the series Walking through the Multi-Domain Active Directory Driver

The new Multi Domain Active Directory driver is a clever new approach to drivers in general yet reusing the hard work and maturity developed in the classic Active Directory driver. In part 1 of this series I discussed the driver creation method, since this time it matters how you do it.

geoffc
By: geoffc
Jan 22, 2016
12:40 pm
Reads:
142
Score:
Unrated
Active Directory Automation Cloud Computing Cloud Security Compliance Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Migrating from Windows XP or 2003 to SUSE Linux Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow