Welcome to NetIQ Cool Solutions!  Explore what is possible with NetIQ products by seeing how product experts use them in real life.  Download purpose-built Cool Tools and see if they can help you streamline things.  Share your knowledge and earn Rewards Points.

Why get involved?

Submit articles and Cool Tools, and earn Rewards Points to spend at Amazon.

Sign up now

Subscribe to our newsletter

Latest Posts

Improve Engagement with External Users with SSO. Can you really “have” your cake and “eat” it too? I mean I have cake; I certainly can eat it. Simple, right? Not always. This phrase has created confusion for many years. In the very most literal form of the phrase, you can’t really retain your cake once…

Sep 9, 2016
1:04 pm
Reads:
377
Score:
4

NetIQ LDAP Proxy uses an XML configuration file nlpconf.xml. Sometimes it can get difficult editing the XML file repeatedly to try out policy combinations, complex condition flows, etc. This utility tries to make it slightly simpler by providing a shell friendly command line interface to view the configuration in a human-readable format on the console…

+ read more

By: nkoushik
Sep 9, 2016
1:00 pm
Reads:
230
Score:
5

Updated with webinar links. Because certifying individual access is as tedious and inefficient as counting jelly beans, managers often validate every user’s access without really looking closely at it. This lack of attention means that some users might maintain inappropriate levels of access.

Sep 8, 2016
1:34 pm
Reads:
528
Score:
5

An increasingly common requirement within Identity Management projects is to remove or substitute some characters in a given string. Usually these are non-English (ASCII) characters, accents and diacritic marks. We live in an increasingly global environment. This often causes challenges in identity projects where one must synchronise identity data (names, locations) from a diversity of different…

+ read more

Alexander McHugh
Aug 19, 2016
4:07 pm
Reads:
247
Score:
5

With Identity Manager 4.5 the way the User Application is configured changed a great deal. Previously, the configupdate.sh tool would do a fair bit of work, unpacking the IDMProv.war file, which is really just a very large ZIP file, changing some of the internal configuration files, and then repack it. As you can imagine, this…

+ read more

geoffc
By: geoffc
Aug 19, 2016
3:53 pm
Reads:
233
Score:
5

Many times you may experience regular slowdowns on MS SQL database. There could be many reasons for CPU bottleneck on MS SQL Server but one of the main reasons for CPU bottlenecks is insufficient hardware resources. However, CPU utilization can usually be reduced by configuration changes and query tuning so you may like to avoid…

+ read more

Anmol Rastogi
Aug 9, 2016
1:35 pm
Reads:
234
Score:
Unrated

Office 365 licensing is unique where it is possible to mix and match various Enterprise Plans. The two common types of plans offered are Enterprise Packaged Plans and Enterprise Individual Plans. Currently there are three different packaged enterprise plans offered which are E1, E3, and E4. The enterprise…

By: vivekbm
Aug 3, 2016
5:03 pm
Reads:
506
Score:
5
Active Directory Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Migrating from Windows XP or 2003 to SUSE Linux Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow