Welcome to NetIQ Cool Solutions!  Explore what is possible with NetIQ products by seeing how product experts use them in real life.  Download purpose-built Cool Tools and see if they can help you streamline things.  Share your knowledge and earn Rewards Points.

Why get involved?

Submit articles and Cool Tools, and earn Rewards Points to spend at Amazon.

Sign up now

Subscribe to our newsletter

Latest Posts

NetIQ Access Manager 4.4 provides a rich set of REST Endpoints for NAM such as components Administration and OAuth/OpenID Management. EasyNAMClient uses those Rest Endpoints to provide a learning tool to new NAM users. This tool can be used by NAM/OAuth beginners as a starting point to explore NAM REST Endpoints and to write…

Jul 18, 2018
2:11 pm
Reads:
51
Score:
Unrated

NetIQ Access Manager supports the SAML2 bearer grant. Access Manager supports only the authorization grant flow for assertion and the assertion is used for authenticating the user. You can use SAML2 assertions to request an access token. Access Manager validates the assertion and generates the access token for accessing OAuth protected resources. But the…

By: cstumula
Jul 18, 2018
1:45 pm
Reads:
49
Score:
Unrated

Modern application development interacts with multiple services. These services can be internal or external. Most of the services are developed with Oauth2 support. When the user or mobile access a service, that particular service might be interacting with other services either internal or cloud service. To access other services, it needs the access token….

By: cstumula
Jul 13, 2018
12:29 pm
Reads:
72
Score:
Unrated

In Identity Manager 4.7 there is a new driver available. You can find it in Designer palette under Service, it’s called Identity Gateway Integration Module (IGIM). Sadly I couldn’t find any documentation about it but I decided to try it out and see how far I got. During the package installation it asks you several…

+ read more

Jul 11, 2018
4:02 pm
Reads:
127
Score:
5

To integrate NetIQ Identity Governance with Identity Manager, you must configure single sign-on for both identity applications and Identity Governance and then update the identity applications to recognize Identity Governance. This process includes the following activities…

Jul 10, 2018
1:12 pm
Reads:
156
Score:
5

Counting with operation property: Micro Focus Identity Manager is a big product with many different parts. Even with several years focusing on the product you find yourself learning new stuff on parts that you never stumbled over before…

Jul 6, 2018
5:43 pm
Reads:
162
Score:
5

User Behavioral Analytics (UBA) is a security process that observes the normal patterns of users’ behaviour and uses machine learning algorithms or statistical methods to detect deviations from normal patterns. The premise of UBA is that it is easier to steal user’s credentials than to actually mimic the user’s behaviour once the intruder has taken…

+ read more

By: jmdmajid
Jul 2, 2018
1:50 pm
Reads:
188
Score:
Unrated

In the Access Manager documentation the Port Redirection script works only for SUSE. I have modified the script and added a few more steps to run it on Redhat 7.x, which is using systemd. Follow the steps below…

By: vjohari
Jun 29, 2018
5:18 pm
Reads:
219
Score:
4

Using a SAML 2.0 connection, the service provider (web services or SaaS applications) trusts the identity provider (NAM IDP) to validate the user’s authentication credentials and to send identity information about the authenticated user. The service provider accepts the data and uses it to give the user access to…

Koushik Halder
Jun 20, 2018
8:55 am
Reads:
251
Score:
Unrated

Access Manager 4.4 complies with RFC 7521 and RFC 7522 to support SAML 2 bearer profile with authorization grant flow. You can use a SAML 2 assertion to request an access token. Access Manager can validate the assertion and generate the access token, which can be used to access…

Koushik Halder
Jun 11, 2018
3:06 pm
Reads:
326
Score:
5
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow