Welcome to NetIQ Cool Solutions!  Explore what is possible with NetIQ products by seeing how product experts use them in real life.  Download purpose-built Cool Tools and see if they can help you streamline things.  Share your knowledge and earn Rewards Points.

Why get involved?

Submit articles and Cool Tools, and earn Rewards Points to spend at Amazon.

Sign up now

Subscribe to our newsletter

Latest Posts

It’s amazing how little clarity and visibility we have into the true state of any IT environment, despite getting more and more monitoring tools looking at them.  Sometimes, a common cause for this is actually too many monitoring tools.  Each one may be great for its specialized task, but they fail to communicate with each…

+ read more

wheaps
By: wheaps
Sep 26, 2016
3:10 pm
Reads:
7
Score:
Unrated

Just about every client wants to be able to customize their web presence. For IDM, this includes several different points of customization for IDM Home. SSPR has one, User Application has another, OSP has a third. Each is different. There is no single point to customization for the IDM Home presentation. User Application was the first app to be…

+ read more

tse7147
By: tse7147
Sep 26, 2016
3:07 pm
Reads:
9
Score:
Unrated

If you are planning to install IDM 4.5.2x on RHEL 7.x platforms, this is the right place for you to start. This article will guide you step by step with screenshots on how to meet the preconditions / prerequisites before installing IDM 4.5.x on RHEL 7.x platforms. Note: With the release of NetIQ Identity Manager…

+ read more

By: vkarthik
Sep 26, 2016
2:58 pm
Reads:
22
Score:
5

Improve Engagement with External Users with SSO. Can you really “have” your cake and “eat” it too? I mean I have cake; I certainly can eat it. Simple, right? Not always. This phrase has created confusion for many years. In the very most literal form of the phrase, you can’t really retain your cake once…

Sep 9, 2016
1:04 pm
Reads:
385
Score:
4

NetIQ LDAP Proxy uses an XML configuration file nlpconf.xml. Sometimes it can get difficult editing the XML file repeatedly to try out policy combinations, complex condition flows, etc. This utility tries to make it slightly simpler by providing a shell friendly command line interface to view the configuration in a human-readable format on the console…

+ read more

By: nkoushik
Sep 9, 2016
1:00 pm
Reads:
237
Score:
5

Updated with webinar links. Because certifying individual access is as tedious and inefficient as counting jelly beans, managers often validate every user’s access without really looking closely at it. This lack of attention means that some users might maintain inappropriate levels of access.

Sep 8, 2016
1:34 pm
Reads:
529
Score:
5

An increasingly common requirement within Identity Management projects is to remove or substitute some characters in a given string. Usually these are non-English (ASCII) characters, accents and diacritic marks. We live in an increasingly global environment. This often causes challenges in identity projects where one must synchronise identity data (names, locations) from a diversity of different…

+ read more

Alexander McHugh
Aug 19, 2016
4:07 pm
Reads:
251
Score:
5
Active Directory Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Migrating from Windows XP or 2003 to SUSE Linux Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow