Welcome to NetIQ Cool Solutions!  Explore what is possible with NetIQ products by seeing how product experts use them in real life.  Download purpose-built Cool Tools and see if they can help you streamline things.  Share your knowledge and earn Rewards Points.

Why get involved?

Submit articles and Cool Tools, and earn Rewards Points to spend at Amazon.

Sign up now

Subscribe to our newsletter

Latest Posts

This entry is part 3 of 3 in the series Troubleshooting OSP in IDM 4.5

As I worked through a new Identity Manager 4.5 setup I was trying a number of things and ran across some interesting errors. This series of articles is meant to share what I found, hopefully with error codes for the Google cache. This way, if you run into this error on your own, you might…

+ read more

geoffc
By: geoffc
Apr 17, 2015
9:18 am
Reads:
26
Score:
5

Provide a know list of IP address from a simple text file. The file can be hand crafted. Or, can be downloaded from known set of vulnerable IP addresses. Configuring them in Administration Console is tedious. Use this tool to update a text file and see this is effected in “Risk Based Authentication” of NetIQ Access Manager

Apr 16, 2015
10:57 am
Reads:
57
Score:
Unrated

How is managing user access to IT resources like managing customer access to movies at a megaplex theater? Both megaplex managers and IT managers must weigh the cost of enforcing access rules. Megaplex rules generally prohibit theater hopping, the practice of paying to see one movie, then sampling other movies in the megaplex for free….

+ read more

Travis Greene
Apr 16, 2015
7:27 am
Reads:
36
Score:
Unrated

Previously I had posted a script for port redirection on the Identity Server. I’ve since found this doesn’t work too well when the local SLES firewall is enabled. The following is a better solution. First, create a Firewall Service file that contains the necessary ports to open (this assumes the Administration Console and Identity Server…

+ read more

ScorpionSting
Apr 14, 2015
1:09 pm
Reads:
69
Score:
5

If the rate and intensity at which my identity has been stolen in the past three years keeps pace, by 2017, I might as well advertise my personally identifiable information (PII) in blinking neon pink sky-writing and throw Mardi Gras beads from the airplane. First, my grocery store’s loyalty program was breached. Then I was…

+ read more

Rhonda Holloway
Apr 14, 2015
11:47 am
Reads:
445
Score:
Unrated

The absolute best part of my job is being with customers.  I love it.  Whether I’m presenting to one customer, 500 or anything in between, I love spreading the good word of how Micro Focus | NetIQ solutions can help you run IT better. To that end,  I’m very happy to announce our new IT Operations…

+ read more

Joe Rogers
Apr 14, 2015
7:41 am
Reads:
315
Score:
Unrated
This entry is part 2 of 3 in the series Troubleshooting OSP in IDM 4.5

Recently I spent a lot of time working through the new OSP (One SSO Provider) used in Identity Manager 4.5 for logging into the various Identity Applications (User Application, Catalog Access, Home and Provisioning Dashboard, Reporting, Access Review). When I work…

geoffc
By: geoffc
Apr 10, 2015
9:57 am
Reads:
124
Score:
5

The most fundamental question for any business – Are we open?  Not just the doors to the building but can we deliver the services that our customers contract with us for? IT is a challenge.  In the previous post,  we talked about making sure that all of your IT stuff is working.  No red lights on…

+ read more

Joe Rogers
Apr 10, 2015
7:25 am
Reads:
226
Score:
5

IT contractors are like in-laws. They may not be blood relatives, but they’re still considered family. Similarly, contractors aren’t standard, permanent employees, but they still work within your organization, making them a part of the organizational family. Some in-laws are dignified and contribute positively to the family; some in-laws dreadful and make holidays a nightmare….

+ read more

Travis Greene
Apr 7, 2015
7:43 am
Reads:
589
Score:
Unrated